Big Brother Media Articles

Excerpts of Key Big Brother Media Articles in Major Media

Below are highly revealing excerpts of important big brother articles reported in the media suggesting a major cover-up. Links are provided to the full articles on major media websites. If any link fails to function, read this webpage. These big brother articles are listed by article date. You can also explore the articles listed by order of importance or by date posted. By choosing to educate ourselves on these important issues and to spread the word, we can and will build a brighter future.

Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

WikiLeaks’ dump of messages to and from Clinton’s campaign chief offer an unprecedented view into the workings of the elite, and how it looks after itself. The emails [are] being slowly released ... from the hacked account of Hillary Clinton’s campaign chair John Podesta. Their significance goes far beyond mere scandal: they ... furnish us with an opportunity to observe the upper reaches of the American status hierarchy. In one now-famous email chain, for example, the reader can watch current US trade representative Michael Froman, writing from a Citibank email address in 2008, appear to name President Obama’s cabinet even before the great hope-and-change election was decided. This genre of Podesta email, in which people try to arrange jobs for themselves or their kids, points us toward the most fundamental thing we know about the people at the top of this class: their loyalty to one another and the way it overrides everything else. Of course Hillary Clinton staffed her state department with investment bankers and then did speaking engagements for investment banks as soon as she was done at the state department. Of course she appears to think that any kind of bank reform should “come from the industry itself”. And of course no elite bankers were ever prosecuted by the Obama administration. Read these emails and you understand, with a start, that the people at the top tier of American life all know each other. They are all engaged in promoting one another’s careers, constantly.

The [FDA] amassed a stockpile of pistols, shotguns, and semiautomatic rifles, along with ample supplies of ammunition, liquid explosives, gun scopes, and suppressors. Between 2006 and 2014, [the Animal and Plant Health Inspection Service, an agency of the USDA] spent nearly $4.8 million to arm itself. And far from being an outlier, it is one of dozens of federal agencies that spends lavishly on guns, ammunition, and military-style equipment. A report issued this month by American Transparency ... chronicles the explosive - and expensive - trend toward militarizing federal agencies, most of which have no military responsibilities. Between 2006 and 2014, the report shows, 67 federal bureaus, departments, offices, and services spent at least $1.48 billion on ammunition and material one might expect to find in the hands of SWAT teams, Special Forces soldiers - or terrorists. The Internal Revenue Service, for example, now spends more than $1 million annually on firearms, ammunition, and military gear. Since 2006, the Department of Veterans Affairs ... has poured nearly $11.7 million into guns and ammo. Even the Smithsonian Institution and the Social Security Administration have each devoted hundreds of thousands of dollars to weaponry. There are now fewer US Marines than there are officers at federal administrative agencies with the authority to carry weapons and make arrests.

Senior CIA officials have for years intentionally deceived parts of the agency workforce by transmitting internal memos that contain false information. The practice is known by the term “eyewash.” Officials said there is no clear mechanism for labeling eyewash cables or distinguishing them from legitimate records being examined by the CIA’s inspector general, turned over to Congress or declassified for historians. Senate investigators uncovered apparent cases of eyewashing as part of a multi-year probe of the CIA’s interrogation program, according to officials who said that the Senate Intelligence Committee found glaring inconsistencies in CIA communications about classified operations, including drone strikes. Former CIA officials ... acknowledged that the internal mechanisms for managing eyewash cables were largely informal. Skeptics described the safeguards as inadequate. “When you introduce falsehoods into the communications stream then you can destabilize the whole system of intelligence oversight and compliance with the law,” said Steven Aftergood, a government secrecy expert at the Federation of American Scientists. “It wasn’t that long ago that we had a CIA executive director who was engaged in criminal activity - you don’t want someone like him preparing eyewash cables,” Aftergood said, referring to Kyle “Dusty” Foggo, the former No. 3 executive at the agency.

Note: Read more about the strange case of Kyle "Dusty" Foggo, the CIA executive convicted of fraud in connection with secret CIA prisons. For more along these lines, see concise summaries of deeply revealing Intelligence agency corruption news articles from reliable major media sources.

The tools European security agencies now have at their disposal ... would make any American or Canadian intelligence officer drool. Britain has literally created a surveillance state. The British Security Industry Authority estimated three years ago the government has installed about six million closed-circuit TV cameras in the public square; one for every 10 citizens. The French, too, have vastly expanded public video surveillance in recent years. And it's all been done with overwhelming support from the general public, which feels safer for the presence of the surveillance, never mind the lack of objective proof that they are more protected against outrages, which keep on occurring. Both England and France are former colonial powers that ... long ago subordinated individual rights to collective security. Canada and America more dearly cherish individual rights. Still, a surveillance state is growing here, too. David Lyon, a professor of surveillance studies at Queen's University, has identified several public surveillance trends, all of which he says are "increasing at an accelerating rate." Canada is not about to become Western Europe, he says, but "it is incumbent upon us as a society to think about the ethical consequences" of mass surveillance. [Some] would argue that the cameras are desperately needed tools, and that anyone who isn't doing anything wrong has nothing to worry about. That of course is the police state justification. They hate us because we are free, we are told. The fact that we've responded by giving up ever more freedom doesn't seem to matter.

Jade Helm 15, the controversial Special Operations exercise that spawned a wave of conspiracy theories about a government takeover, will open next week without any media allowed to observe it, a military spokesman said. Embedded reporters won’t be permitted at any point during the exercise, in which military officials say that secretive Special Operations troops will maneuver through private and publicly owned land in several southern states. The exercise is scheduled for July 15 through September 15 and is expected to include more than 1,200 troops. Army Special Operations Command announced the exercise in March, saying its size and scope would set it apart from most training exercises. For months, some protesters have said Jade Helm is setting the stage for future martial law. Texas Gov. Greg Abbott, a Republican, called in April for the Texas State Guard to monitor the exercise [to] improve communication between Special Operations forces and civilians in Texas. The Washington Post has several times requested access to observe the exercise, making the case to the military that first-hand media coverage would help explain the mission. [Army spokesman Lt. Col. Mark] Lastoria said it is not possible to allow a journalist to travel with Special Operations forces in the field. The military has granted access to Special Operations in the past, however. In one recent example, a journalist observed the exercise Robin Sage in North Carolina.

Note: See interesting information on Jade Helm 15 based on government documents concluding that it is largely an artificial intelligence operation.

Elite service members from four branches of the U.S. military will launch an operation this summer in which they will operate covertly among the U.S. public and travel from state to state in military aircraft. Texas, Utah and a section of southern California are labelled as hostile territory, and New Mexico isn’t much friendlier. That’s the scheme for Jade Helm 15, a new Special Operations exercise that runs from July 15 to Sept. 15. Army Special Operations Command announced it last week, saying the size and scope of the mission sets it apart from many other training exercises. The exercise has prompted widespread conspiracy theories that the United States is preparing to hatch martial law. In particular, some have expressed alarm about this map, which outlines events for the exercise in unclassified documents posted online last week. The Washington Post verified them to be legitimate by speaking to Army sources. They appear to have been prepared for local authorities. It’s also worth noting that the military has routinely launched exercises in the past in which regions of the United States are identified as hostile for the purpose of training.

Note: This Washington Post article is clearly playing down some important facts and developments. Why is the US military spending so much time and money preparing for scenarios where US soil and citizens are considered enemies? Read and educate yourself with this excellent article on Operation Jade Helm 15, one in a string of US exercises planning for mass civilian arrests under a variety of scenarios.

Navy Plans Electromagnetic War Games Over National Park and Forest in Washington State

Olympic National Park and Olympic National Forest in Washington State are ... where the US Navy aims to conduct its Northwest Electromagnetic Radiation Warfare training program. It will fly ... 2,900 training exercises over wilderness, communities and cities across the Olympic Peninsula for 260 days per year, with exercises lasting up to 16 hours per day. No public notices for the Navy's plans were published in any media that directly serve the Olympic Peninsula. But word spread. Public outcry forced the Navy to extend the public comment period until November 28 and schedule more public meetings. According to the US Navy's Information Dominance Roadmap 2013-2028, the Navy states it "will require new capabilities to fully employ integrated information in warfare by expanding the use of advanced electronic warfare." The purpose of these war games is to train to deny the enemy "all possible frequencies of electromagnetic radiation (i.e. electromagnetic energy) for use in such applications as communication systems..." David King, the mayor of Port Townsend, a town on the Northeast corner of the Olympic Peninsula, has voiced his opposition to the plan, along with numerous other public officials. Mike Welding, the Naval Air Station at Whidbey Island spokesman, recently admitted to reporters, "If someone is in the exclusion area for more than 15 minutes, that's a ballpark estimate for when there would be some concern for potential to injure, to receive burns."

Note: We don't generally use truth-out.org as a reliable source, but as no major media are covering this most important development, we're including this article here. To verify this information, please click on some of the links in the article and see the U.S. Navy's "Information Dominance Roadmap".

In June 2011, (WikiLeaks’ founder) Julian Assange received an unusual visitor: the chairman of Google, Eric Schmidt. The stated reason for the visit was a book. Schmidt was penning a treatise with Jared Cohen, the director of Google Ideas. Cohen had moved to Google from the U.S. State Department. Schmidt arrived first, accompanied by his then partner, Lisa Shields ... a vice president of the Council on Foreign Relations. Two months later, WikiLeaks’ release of State Department cables was coming to an abrupt end. Two years later, in the wake of his early 2013 visits to China, North Korea and Burma, it would come to be appreciated that the chairman of Google might be conducting, in one way or another, “back-channel diplomacy” for Washington. In 1999 ... Schmidt joined the New America Foundation. The foundation and its 100 staff serve as an influence mill, using its network of approved national security, foreign policy and technology pundits to place hundreds of articles and op-eds per year. In 2003, the U.S. National Security Agency (NSA) had already started systematically violating the Foreign Intelligence Surveillance Act (FISA). During the same period, Google ... was accepting NSA money to the tune of $2 million to provide the agency with search tools. In 2012, Google arrived on the list of top-spending Washington, D.C., lobbyists. Whether it is being just a company or “more than just a company,” Google’s geopolitical aspirations are firmly enmeshed within the foreign-policy agenda of the world’s largest superpower.

Note: Read the complete Newsweek article summarized above for Julian Assange's detailed accounting of the connections between Washington D.C. insiders, Google and related technology companies, intelligence agencies, and civil society organizations. For more about Wikileaks, read this news article summary. For more on the geopolitical big picture, see these concise summaries of deeply revealing news articles from reliable major media sources.

Key Democrats, Led by Hillary Clinton, Leave No doubt that Endless War is Official U.S. Doctrine

Any doubts about whether Endless War ... is official American doctrine should be permanently erased by this week’s comments from two leading Democrats, both former top national security officials in the Obama administration. Leon Panetta, the long-time Democratic Party operative who served as Obama’s Defense Secretary and CIA Director, said this week of Obama’s new bombing campaign: “I think we’re looking at kind of a 30-year war.” He criticized Obama ... for being insufficiently militaristic. Then we have Hillary Clinton [who] at an event in Ottawa yesterday ... proclaimed that the fight against these “militants” will “be a long-term struggle” that should entail an “information war” as “well as an air war.” The new war, she said, is “essential” and the U.S. shies away from fighting it “at our peril.” Like Panetta (and most establishment Republicans), Clinton made clear ... that virtually all of her disagreements with Obama’s foreign policy were the by-product of her view of Obama as insufficiently hawkish, militaristic and confrontational. “Endless War” is not dramatic rhetorical license but a precise description of America’s foreign policy. It’s not hard to see why. A state of endless war justifies ever-increasing state power and secrecy and a further erosion of rights. It also entails a massive transfer of public wealth to the “homeland security” and weapons industry (which the US media deceptively calls the “defense sector”). The War on Terror ... was designed from the start to be endless. This war ... thus enables an endless supply of power and profit to flow to those political and economic factions that control the government regardless of election outcomes.

Note: Read the prophetic writings of one of the most highly decorated US generals ever describing how he discovered after retirement that war is created by bankers and mega-corporations to funnel ever more tax-payer money into their coffers. For more along these lines, see the excellent, reliable resources provided in our War Information Center.

My biggest battle with the NSA came before my book [The Puzzle Palace] was even published. I had obtained the criminal file that the Justice Department had opened on the NSA. Marked as Top Secret, the file was so sensitive that only two original copies existed. Never before or since has an entire agency been the subject of a criminal investigation. Senior officials at the NSA were even read their Miranda rights. Issued on June 6, 1975, the report noted that both the NSA and CIA had engaged in questionable and possibly illegal electronic surveillance. As a result, Attorney General Edward Levi established a secret internal task force to look into the potential for criminal prosecution. Focusing particularly on NSA, the task force probed more deeply into domestic eavesdropping than any part of the executive branch had ever done before. The report’s prosecutive summary also pointed to the NSA’s top-secret “charter” issued by the Executive Branch, which exempts the agency from legal restraints placed on the rest of the government. This ... meant the NSA did not have to follow any restrictions placed on electronic surveillance “unless it was expressly directed to do so.” In short, the report asked, how can you prosecute an agency that is above the law? More than three decades later, the NSA, like a mom-and-pop operation that has exploded into a global industry, now employs sweeping powers of surveillance that Frank Church could scarcely have imagined in the days of wired phones and clunky typewriters. At the same time, the Senate intelligence committee he once chaired has done an about face, protecting the agencies from the public rather than the public from the agencies. Without adequate oversight, or penalties for abuse, the only protection that citizens have comes not from Congress or the courts, but from whistleblowers.

Note:James Bamford is the courageous ABC producer and investigative reporter who first exposed the declassified Operation Northwoods files in the May of 2001. These files showed beyond a shadow of a doubt that the top Pentagon generals were willing to carry out false flag terrorism activities which would kill innocent civilians in order to foment war fever against Cuba. Yet only ABC News out of all the major media outlets was willing to report this most shocking news. Don't miss the entire, highly revealing article by Bamford at the link above.

Australia has changed radically since last week though it might not look like it on the surface. Late Thursday night the Senate passed the National Security Amendment Bill (No.1) 2014 giving unlimited power to spies and secret police. Now officials can break the law with immunity from prosecution - and without having to answer to a court. They can act in total secrecy. They will decide what they do and to whom and when. They do not have to ask permission. They will choose when to interfere in your life and when they won't. They can dip into your most private communications and they don't need a warrant to do so. Sometimes they will do it because it is necessary to fight crime. Sometimes because they enjoy it. If they mess up your life and you tell anybody, you will get 10 years' jail – even if it doesn't harm security. When a Special Intelligence Operation (SIO) is declared then any participant can break the law on you with no consequences, according to Schedule 3 section 35k. There are broad limits. They cannot kill or torture you, or cause significant physical injury. Minor injury or mental torment is fine. Anyone involved in an SIO will have these powers – but who are they? ASIO, with 1778 staff. The Australian Federal Police, with more than 6900 staff. NSW Police with about 16,370 officers and a spy database called COPS which has more than 30 million entries on the people of NSW. But not just them. Anyone involved in an SIO enjoys legal immunity, including affiliates and subcontractors – whoever they are. Many Senators clearly hadn't read the 128 pages of major legal changes in the NSA Bill. The citizen needs protection from the state built into the laws and that is what they smashed on Thursday.

Prime Minister John Key ... has denied that New Zealand’s spy agency GCSB engages in mass surveillance, mostly as a means of convincing the country to enact a new law vesting the agency with greater powers. Let me be clear: any statement that mass surveillance is not performed in New Zealand, or that the internet communications are not comprehensively intercepted and monitored, or that this is not intentionally and actively abetted by the GCSB, is categorically false. If you live in New Zealand, you are being watched. At the NSA I routinely came across the communications of New Zealanders in my work with a mass surveillance tool we share with GCSB, called “XKEYSCORE.” It allows total, granular access to the database of communications collected in the course of mass surveillance. It is not limited to or even used largely for the purposes of cybersecurity, as has been claimed, but is instead used primarily for reading individuals’ private email, text messages, and internet traffic. I know this because it was my full-time job in Hawaii, where I worked every day in an NSA facility with a top secret clearance. The prime minister’s claim to the public, that “there is no and there never has been any mass surveillance” is false. The GCSB, whose operations he is responsible for, is directly involved in the untargeted, bulk interception and algorithmic analysis of private communications sent via internet, satellite, radio, and phone networks. It means they have the ability see every website you visit, every text message you send, every call you make, every ticket you purchase, every donation you make, and every book you order online. From “I’m headed to church” to “I hate my boss” to “She’s in the hospital,” the GCSB is there. Your words are intercepted, stored, and analyzed by algorithms long before they’re ever read by your intended recipient.

The U.S. government threatened to fine Yahoo $250,000 a day in 2008 if it failed to comply with a broad demand to hand over user communications — a request the company believed was unconstitutional — according to court documents unsealed [on September 11] that illuminate how federal officials forced American tech companies to participate in the National Security Agency’s controversial PRISM program. The documents ... outline a secret and ultimately unsuccessful legal battle by Yahoo to resist the government’s demands. The company’s loss required Yahoo to become one of the first to begin providing information to PRISM, a program that gave the NSA extensive access to records of online communications by users of Yahoo and other U.S.-based technology firms. The ruling by the Foreign Intelligence Surveillance Court of Review became a key moment in the development of PRISM, helping government officials to convince other Silicon Valley companies that unprecedented data demands had been tested in the courts and found constitutionally sound. Eventually, most major U.S. tech companies, including Google, Facebook, Apple and AOL, complied. Microsoft had joined earlier, before the ruling, NSA documents have shown. PRISM was first revealed by former NSA contractor Edward Snowden last year. Documents made it clear that the program allowed the NSA to order U.S.-based tech companies to turn over e-mails and other communications to or from foreign targets without search warrants for each of those targets. Other NSA programs gave even more wide-ranging access to personal information of people worldwide, by collecting data directly from fiber-optic connections.

Throughout the last year, the U.S. government has repeatedly insisted that it does not engage in economic and industrial espionage, in an effort to distinguish its own spying from China’s infiltrations of Google, Nortel, and other corporate targets. [But] the NSA was caught spying on plainly financial targets such as the Brazilian oil giant Petrobras; economic summits; international credit card and banking systems; the EU antitrust commissioner investigating Google, Microsoft, and Intel; and the International Monetary Fund and World Bank. In response, the U.S. modified its denial to acknowledge that it does engage in economic spying, but unlike China, the spying is never done to benefit American corporations. But a secret 2009 report issued by [Director of National Intelligence James Clapper's] office explicitly contemplates doing exactly that. The document, the 2009 Quadrennial Intelligence Community Review—provided by NSA whistleblower Edward Snowden—is a fascinating window into the mindset of America’s spies. One of the principal threats raised in the report is a scenario “in which the United States’ technological and innovative edge slips”— in particular, “that the technological capacity of foreign multinational corporations could outstrip that of U.S. corporations.” How could U.S. intelligence agencies solve that problem? The report recommends “a multi-pronged, systematic effort to gather open source and proprietary information through overt means, clandestine penetration (through physical and cyber means), and counterintelligence”.

The US government’s web of surveillance is vast and interconnected. You can be pulled into the National Security Agency’s database quietly and quickly. Through ICREACH, a Google-style search engine created for the intelligence community, the NSA provides data on private communications to 23 government agencies. More than 1,000 analysts had access to that information. It was confirmed earlier this month that the FBI shares its master watchlist, the Terrorist Screening Database, with at least 22 foreign governments, countless federal agencies, state and local law enforcement, plus private contractors. The watchlist [is] based on [low] standards and secret evidence, which ensnares innocent people. Indeed, the standards are so low that the US government’s guidelines specifically allow for a single, uncorroborated source of information – including a Facebook or Twitter post – to serve as the basis for placing you on its master watchlist. Of the 680,000 individuals on that FBI master list, roughly 40% have “no recognized terrorist group affiliation”, according to the Intercept. These individuals don’t even have a connection – as the government loosely defines it – to a designated terrorist group, but they are still branded as suspected terrorists. The US [government uses] a loose standard – so-called “reasonable suspicion” – in determining who, exactly, can be watchlisted. ["Reasonable suspicion"] requires neither “concrete evidence” nor “irrefutable evidence”. Instead, an official is permitted to consider “reasonable inferences” and “to draw from the facts in light of his/her experience”.

Note: For more on this, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.

Nigeria's president has formally launched a national electronic identity card, which all Nigerians will have to have by 2019 if they want to vote ... the first biometric card which can also be used to make electronic payments. MasterCard is providing the prepaid payment element and it hopes millions of Nigerians without bank accounts will now gain access to financial services. An attempt to introduce national ID cards in Nigeria 10 years ago failed. Analysts blame corruption for its failure. MasterCard said combining an identity card with a payment card for those aged 16 and over was a significant move. "It breaks down one of the most significant barriers to financial inclusion - proof of identity," MasterCard's Daniel Monehin said in a statement. The new cards show a person's photograph, name, age and unique ID number - and 10 fingerprints and an iris are scanned during enrolment. These details are intended to ensure that there are no duplicates on the system. During the pilot phase, which began registering names last October, 13 million MasterCard-branded ID cards will be issued. There are enrolment centres in all 36 states and there is no fee to get the card, though people will be charged in the event that it needs to be replaced. The Nigerian Identity Management Commission (NIMC), which is behind the rollout, is trying to integrate several government databases including those for driving licences, voter registration, health insurance, taxes and pensions.

Note: This identification scheme is underwritten by a major financial services company, and directly connects a citizen's political identity, financial identity, and biological identity to a centralized electronic database. To understand some of the dangers of this, see concise summaries of deeply revealing microchip implant news articles from reliable major media sources.

Les Goldsmith, the CEO of ESD America [marketers of the Crytophone 500], points me to a map that he and his customers have created, indicating 17 different phony cell towers known as “interceptors,” detected by the CryptoPhone 500 around the United States during the month of July alone. Interceptors look to a typical phone like an ordinary tower. Once the phone connects with the interceptor, a variety of “over-the-air” attacks become possible, from eavesdropping on calls and texts to pushing spyware to the device. “Interceptor use in the U.S. is much higher than people had anticipated,” Goldsmith says. “One of our customers took a road trip from Florida to North Carolina and he found 8 different interceptors on that trip. We even found one at South Point Casino in Las Vegas.” Who is running these interceptors and what are they doing with the calls? Goldsmith says we can’t be sure, but he has his suspicions. “Are some of them U.S. government interceptors?” [asks] Goldsmith. Interceptors vary widely in expense and sophistication – but in a nutshell, they are radio-equipped computers with software that can use arcane cellular network protocols and defeat the onboard encryption. For governments or other entities able to afford a price tag of “less than $100,000,” says Goldsmith, high-quality interceptors are quite realistic. Some interceptors are limited, only able to passively listen to either outgoing or incoming calls. But full-featured devices like the VME Dominator, available only to government agencies, can not only capture calls and texts, but even actively control the phone, sending out spoof texts, for example.

Note: Do you think the government might have put up fake cell towers to nab more data? For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.

The National Security Agency is secretly providing data to nearly two dozen U.S. government agencies with a “Google-like” search engine built to share more than 850 billion records about phone calls, emails, cellphone locations, and internet chats, according to classified documents obtained by The Intercept. The documents provide the first definitive evidence that the NSA has for years made massive amounts of surveillance data directly accessible to domestic law enforcement agencies. ICREACH [as the search engine is called] contains information on the private communications of foreigners and, it appears, millions of records on American citizens who have not been accused of any wrongdoing. Details about its existence are contained in the archive of materials provided to The Intercept by NSA whistleblower Edward Snowden. Earlier revelations sourced to the Snowden documents have exposed a multitude of NSA programs for collecting large volumes of communications. The NSA has acknowledged that it shares some of its collected data with domestic agencies like the FBI, but details about the method and scope of its sharing have remained shrouded in secrecy. ICREACH has been accessible to more than 1,000 analysts at 23 U.S. government agencies that perform intelligence work, according to a 2010 memo. Information shared through ICREACH can be used to track people’s movements, map out their networks of associates, help predict future actions, and potentially reveal religious affiliations or political beliefs.

Development of a U.S. counterattack for cyberterrorism that could do more harm than good was one of the final events that drove Edward Snowden to leak government secrets, the former National Security Agency contractor tells Wired magazine. Snowden ... said the MonsterMind program was designed to detect a foreign cyberattack and keep it from entering the country. But it also would automatically fire back. The problem, he said, is malware can be routed through an innocent third-party country. "These attacks can be spoofed," he told Wired. MonsterMind for example ... could accidentally start a war. And it's the ultimate threat to privacy because it requires the NSA to gain access to virtually all private communications coming in from overseas. "The argument is that the only way we can identify these malicious traffic flows and respond to them is if we're analyzing all traffic flows," he said. "And if we're analyzing all traffic flows, that means we have to be intercepting all traffic flows. That means violating the Fourth Amendment, seizing private communications without a warrant, without probable cause or even a suspicion of wrongdoing. For everyone, all the time. You get exposed to a little bit of evil, a little bit of rule-breaking, a little bit of dishonesty, a little bit of deceptiveness, a little bit of disservice to the public interest, and you can brush it off, you can come to justify it," Snowden told Wired. "But if you do that, it creates a slippery slope that just increases over time. And by the time you've been in 15 years, 20 years, 25 years, you've seen it all and it doesn't shock you. And so you see it as normal."

Note: Read the cover story from Wired magazine with a deep inside report on Snowden.

To many Americans, online eavesdropping by the U.S. National Security Agency is an outrage, a threat to privacy and freedom. To some, it's a business opportunity. A small but growing number of companies have introduced Internet and communications services designed to shield users from the government's eyes. A few even advertise their products as "NSA-proof." Many of the companies have been offering encrypted online services for years, scrambling their customers' data and communications in ways that require the right computer-generated "key" to decode. They are at least as concerned with thwarting private hackers and corporate spies as they are with blocking federal agents. But some entrepreneurs in the field found motivation in the NSA, after learning that the agency has been collecting troves of Internet and phone data on ordinary citizens for years. "Privacy and democracy go hand in hand - that's why this is so important," said Jason Stockman, one of the creators of ProtonMail, which began offering an encrypted e-mail service in May. "Our goal is to protect people against mass surveillance." But most companies will quickly admit that if the NSA - or some foreign intelligence service - really wants your data, they can't guarantee protection. Since the NSA conducts its business in secret, its full capabilities remain a matter of speculation. Most companies that invoke the NSA in their marketing focus on encryption.

Bill Binney worked at the National Security Agency [for] nearly three decades as one of its leading crypto-mathematicians. He then became one of its leading whistleblowers. The NSA is overseen by Congress, the courts and other government departments. It's also supposed to be watched from the inside by its own workers. But over the past dozen years, whistleblowers like Binney have had a rough track record. Those who tried unsuccessfully to work within the system say Edward Snowden — the former National Security Agency contractor who shared top-secret documents with reporters — learned from their bitter experience. For Binney, the decision to quit the NSA and become a whistleblower began a few weeks after the terrorist attacks of Sept. 11, 2001, when he says he discovered the spy agency had begun using software he'd created to scoop up information on Americans — all without a court order. "I had to get out of there, because they were using the program I built to do domestic spying, and I didn't want any part of it, I didn't want to be associated with it," he says. "I look at it as basically treason. They were subverting the Constitution." Binney says he and two other NSA colleagues who also quit tried sounding the alarm with congressional committees. But because they did not have documents to prove their charges, nobody believed them. Snowden, he says, did not repeat that mistake. "He recognized right away, it was very clear to me, that if he wanted anybody to believe him, he'd have to take a lot of documentation with him — which is what he did," Binney says.

The former National Security Agency contractor Edward J. Snowden said in a wide-ranging interview ... that the oversight of surveillance programs was so weak that members of the United States military working at the spy agency sometimes shared sexually explicit photos they intercepted. He also said the British government often pioneered the most invasive surveillance programs because its intelligence services operate with fewer restrictions intended to protect individual privacy than its counterparts in the United States and other allies. “In the course of their daily work they stumble across something that is completely unrelated to their work, for example an intimate nude photo of someone in a sexually compromising situation but they’re extremely attractive,” he said. “So what do they do? They turn around in their chair and they show a co-worker. And their co-worker says: ‘Oh, hey, that’s great. Send that to Bill down the way.’ ” Mr. Snowden said that type of sharing ... was “seen as the fringe benefits of surveillance positions.” He said that this was never reported and that the system for auditing surveillance programs was “incredibly weak.” Mr. Snowden had particularly stark criticism for the British government’s surveillance programs, because in Britain the respect for individual privacy, he said, “is not strongly encoded in law or policy.” Because it has fewer restrictions, British intelligence platforms “are used as a testing ground” for programs of all five intelligence partners, a group referred to as “Five Eyes,” which includes Britain, Canada, Australia, New Zealand and the United States.”

Note: For more on this, see concise summaries of deeply revealing privacy news articles from reliable major media sources.

Meet Executive Order 12333: The Reagan rule that lets the NSA spy on Americans

In March I received a call from the White House counsel’s office regarding a speech I had prepared for my boss at the State Department. The speech was about the impact ... of National Security Agency surveillance practices. The draft stated that “if U.S. citizens disagree with congressional and executive branch determinations about the proper scope of signals intelligence activities, they have the opportunity to change the policy through our democratic process.” But the White House counsel’s office told me that no, that wasn’t true. I was instructed to amend the line. Some intelligence practices remain so secret, even from members of Congress, that there is no opportunity for our democracy to change them. Public debate about the bulk collection of U.S. citizens’ data by the NSA has focused largely on Section 215 of the Patriot Act. Based in part on classified facts that I am prohibited by law from publishing, I believe that Americans should be even more concerned about the collection and storage of their communications under Executive Order 12333 than under Section 215. Unlike Section 215, the executive order authorizes collection of the content of communications, not just metadata, even for U.S. persons. It does not require that the affected U.S. persons be suspected of wrongdoing and places no limits on the volume of communications by U.S. persons that may be collected and retained. None of the reforms that Obama announced earlier this year will affect such collection.

The NSA whistleblower, Edward Snowden, has urged lawyers, journalists, doctors, accountants, priests and others with a duty to protect confidentiality to upgrade security in the wake of the spy surveillance revelations. Snowden said professionals were failing in their obligations to their clients, sources, patients and parishioners in what he described as a new and challenging world. "What last year's revelations showed us was irrefutable evidence that unencrypted communications on the internet are no longer safe. Any communications should be encrypted by default," he said. Snowden's plea for the professions to tighten security came during an extensive and revealing interview with the Guardian in Moscow. During the seven hours of interview, Snowden: • Said if he ended up in US detention in Guantánamo Bay he could live with it. • Does not have any regrets. • Said that ... he was independently secure, living on savings, and money from awards and speeches he has delivered online round the world. • Made a startling claim that a culture exists within the NSA in which, during surveillance, nude photographs picked up of people in "sexually compromising" situations are routinely passed around. He works online late into the night; a solitary, digital existence not that dissimilar to his earlier life. He said he was using part of that time to work on the new focus for his technical skills, designing encryption tools to help professionals such as journalists protect sources and data. He is negotiating foundation funding for the project, a contribution to addressing the problem of professions wanting to protect client or patient data, and in this case journalistic sources.

William Binney is one of the highest-level whistleblowers [to] emerge from the NSA. He was a leading code-breaker against the Soviet Union during the Cold War but resigned soon after September 11, disgusted by Washington’s move towards mass surveillance. On 5 July he spoke at a conference in London organised by the Centre for Investigative Journalism and revealed the extent of the surveillance programs unleashed by the Bush and Obama administrations. “At least 80% of fibre-optic cables globally go via the US”, Binney said. “This is no accident and allows the US to view all communication coming in. At least 80% of all audio calls, not just metadata, are recorded and stored in the US. The NSA lies about what it stores.” Binney ... described a future where surveillance is ubiquitous and government intrusion unlimited. “The ultimate goal of the NSA is total population control”, Binney said. He praised the revelations and bravery of former NSA contractor Edward Snowden. Unlike Snowden, Binney didn’t take any documents with him when he left the NSA. He now says that hard evidence of illegal spying would have been invaluable. The latest Snowden leaks, featured in the Washington Post, detail private conversations of average Americans with no connection to extremism. It shows that the NSA is not just pursuing terrorism, as it claims, but ordinary citizens going about their daily communications. “The NSA is mass-collecting on everyone”, Binney said, “and it’s said to be about terrorism but inside the US it has stopped zero attacks.”

Ordinary Internet users, American and non-American alike, far outnumber legally targeted foreigners in the communications intercepted by the National Security Agency from U.S. digital networks, according to a four-month investigation by The Washington Post. [90% of] account holders found in a large cache of intercepted conversations, which former NSA contractor Edward Snowden provided in full to The Post, were not the intended surveillance targets but were caught in a net the agency had cast for somebody else. Many of them were Americans. [Many] files, described as useless by the analysts but nonetheless retained, have a startlingly intimate, even voyeuristic quality. They tell stories of love and heartbreak, illicit sexual liaisons, mental-health crises, political and religious conversions, financial anxieties and disappointed hopes. The daily lives of more than 10,000 account holders who were not targeted are catalogued and recorded nevertheless. The cache Snowden provided came from domestic NSA operations under the broad authority granted by Congress in 2008 with amendments to the Foreign Intelligence Surveillance Act. FISA content is generally stored in closely controlled data repositories, and for more than a year. The files offer an unprecedented vantage point on the changes wrought by Section 702 of the FISA amendments, which enabled the NSA to make freer use of methods that for 30 years had required probable cause and a warrant from a judge.

A classified 2010 legal certification and other documents indicate the NSA has been given a far more elastic authority than previously known, one that allows it to intercept through U.S. companies not just the communications of its overseas targets but any communications about its targets as well. The certification — approved by the Foreign Intelligence Surveillance Court and included among a set of documents leaked by former NSA contractor Edward Snowden — lists 193 countries that would be of valid interest for U.S. intelligence. The certification also permitted the agency to gather intelligence about entities including the World Bank, the International Monetary Fund, the European Union and the International Atomic Energy Agency. The documents underscore the remarkable breadth of potential “foreign intelligence” collection. An affidavit in support of the 2010 foreign-government certification said the NSA believes that foreigners who will be targeted for collection “possess, are expected to receive and/or are likely to communicate foreign intelligence information concerning these foreign powers.” That language could allow for surveillance of academics, journalists and human rights researchers. A Swiss academic who has information on the German government’s position in the run-up to an international trade negotiation, for instance, could be targeted if the government has determined there is a foreign-intelligence need for that information. If a U.S. college professor e-mails the Swiss professor’s e-mail address or phone number to a colleague, the American’s e-mail could be collected as well, under the program’s court-approved rules.

The Obama administration has been quietly advising local police not to disclose details about surveillance technology they are using to sweep up basic cellphone data from entire neighborhoods. Citing security reasons, the U.S. has intervened in routine state public records cases and criminal trials regarding use of the technology. This has resulted in police departments withholding materials or heavily censoring documents in rare instances when they disclose any [information] about the purchase and use of such powerful surveillance equipment. One well-known type of this surveillance equipment is known as a Stingray. The equipment tricks cellphones into identifying some of their owners' account information, like a unique subscriber number, and transmitting data to police as if it were a phone company's tower. That allows police to obtain cellphone information without having to ask for help from service providers ... and can locate a phone without the user even making a call or sending a text message. The Obama administration is asking agencies to withhold common information about the equipment, such as how the technology is used and how to turn it on. "These extreme secrecy efforts are in relation to very controversial, local government surveillance practices using highly invasive technology," said Nathan Freed Wessler, a staff attorney with the American Civil Liberties Union, which has fought for the release of these types of records. "People should have the facts about what the government is doing to them."

[Google engineers] are making it far more difficult — and far more expensive — for the National Security Agency and the intelligence arms of other governments around the world to pierce their systems. As fast as it can, Google is sealing up cracks in its systems that Edward J. Snowden revealed the N.S.A. had brilliantly exploited. It is encrypting more data as it moves among its servers and helping customers encode their own emails. Facebook, Microsoft and Yahoo are taking similar steps. After years of cooperating with the government, the immediate goal now is to thwart Washington — as well as Beijing and Moscow. The strategy is also intended to preserve business overseas in places like Brazil and Germany that have threatened to entrust data only to local providers. A year after Mr. Snowden’s revelations, the era of quiet cooperation is over. Telecommunications companies say they are denying requests to volunteer data not covered by existing law. A.T.&T., Verizon and others say that compared with a year ago, they are far more reluctant to cooperate with the United States government in “gray areas” where there is no explicit requirement for a legal warrant. But governments are fighting back, harder than ever. The cellphone giant Vodafone reported ... that a “small number” of governments around the world have demanded the ability to tap directly into its communication networks [and] noted that some countries did not issue warrants to obtain phone, email or web-searching traffic, because “the relevant agencies and authorities already have permanent access to customer communications via their own direct link.”

Government agencies are able to listen to phone conversations live and even track the location of citizens without warrants using secret cables connected directly to network equipment, admits Vodafone today. The company said that secret wires have been connected to its network and those belonging to competitors, giving government agencies the ability to tap in to phone and broadband traffic. In many countries this is mandatory for all telecoms companies, it said. Vodafone is today publishing its first Law Enforcement Disclosure Report which will describe exactly how the governments it deals with are eavesdropping on citizens. It is calling for an end to the use of “direct access” eavesdropping and transparency on the number of warrants issued giving access to private data. Gus Hosein, executive director of Privacy International, said: "Vodafone is taking a commendable step by taking this issue on at an international scale. And they are trying to identify the legal basis for governments' claimed powers. Governments around the world are unashamedly abusing privacy by demanding access to communications and data, and alarmingly, sometimes granting themselves direct access to the networks. Now that Vodafone has been more open, the entire industry has cover to take the necessary next step of pushing back. Pushing back against bad requests is a start, pushing back against bad laws is the next step. The usefulness of transparency reports hinges on governments abiding by the rule of law. We now know that these reports only provide a limited picture of what is going on.”

Note: For more on government surveillance of the world's population, see the deeply revealing reports from reliable major media sources available here.

NPR’s David Folkenflik has a revealing new look at ... one of the most important journalistic stories of the last decade: The New York Times‘ 2004 decision ... to suppress for 15 months (through Bush’s re-election) its reporters’ discovery that the NSA was illegally eavesdropping on Americans without warrants. This episode was one significant reason Edward Snowden purposely excluded the Times from his massive trove of documents. In an interview with Folkenflik, the paper’s new executive editor, Dean Baquet, describes the paper’s exclusion from the Snowden story as “really painful.” But ... Baquet has his own checkered history in suppressing plainly newsworthy stories at the government’s request, including a particularly inexcusable 2007 decision, when he was the managing editor of The Los Angeles Times, to kill a story based on AT&T whistleblower Mark Klein’s revelations that the NSA had built secret rooms at AT&T to siphon massive amounts of domestic telephone traffic. In his NPR interview, Baquet insists that he has had a serious change of heart on such questions as a result of the last year of NSA revelations: "[Baquet] says the experience has proved that news executives are often unduly deferential to seemingly authoritative warnings unaccompanied by hard evidence." Dean Baquet’s epiphany about the U.S. government and the American media ... is long overdue, but better late than never. Let us hope that it signals an actual change in behavior.

The National Security Agency is harvesting huge numbers of images of people from communications that it intercepts through its global surveillance operations for use in sophisticated facial recognition programs, according to top-secret documents. The spy agency’s reliance on facial recognition technology has grown significantly over the last four years as the agency has turned to new software to exploit the flood of images included in emails, text messages, social media, videoconferences and other communications. Agency officials believe that technological advances could revolutionize the way that the N.S.A. finds intelligence targets around the world. The agency’s ambitions for this highly sensitive ability and the scale of its effort have not previously been disclosed. The agency intercepts “millions of images per day” — including about 55,000 “facial recognition quality images” — which translate into “tremendous untapped potential,” according to 2011 documents obtained from the former agency contractor Edward J. Snowden. It is not clear how many people around the world, and how many Americans, might have been caught up in the effort. Neither federal privacy laws nor the nation’s surveillance laws provide specific protections for facial images. Civil-liberties advocates and other critics are concerned that the power of the improving technology, used by government and industry, could erode privacy. “Facial recognition can be very invasive,” said Alessandro Acquisti, a researcher on facial recognition technology at Carnegie Mellon University.

Note: For another New York Times article showing how the NSA is using mobile phone apps to "snatch data revealing the player’s location, age, sex and other personal information," see this article.

Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahamas

The National Security Agency is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the Bahamas. According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system – code-named SOMALGET – that was implemented without the knowledge or consent of the Bahamian government. SOMALGET is part of a broader NSA program called MYSTIC, which ... is being used to secretly monitor the telecommunications systems of the Bahamas and several other countries, including Mexico, the Philippines, and Kenya. But while MYSTIC scrapes mobile networks for so-called “metadata” – information that reveals the time, source, and destination of calls – SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country. The program raises profound questions about the nature and extent of American surveillance abroad. The U.S. intelligence community routinely justifies its massive spying efforts by citing the threats to national security posed by global terrorism and unpredictable rival nations like Russia and Iran. But the NSA documents indicate that SOMALGET has been deployed in the Bahamas to locate “international narcotics traffickers and special-interest alien smugglers” – traditional law-enforcement concerns, but a far cry from derailing terror plots or intercepting weapons of mass destruction.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.

Everyone should know just how much the government lied to defend the NSA

Just before Edward Snowden became a household name, the ACLU argued before the supreme court that the FISA Amendments Act – one of the two main laws used by the NSA to conduct mass surveillance – was unconstitutional. In a sharply divided opinion, the Supreme Court ruled, 5-4, that the case should be dismissed because the plaintiffs didn't have "standing". The court relied on two claims by the Justice Department to support their ruling: 1) that the NSA would only get the content of Americans' communications without a warrant when they are targeting a foreigner abroad for surveillance, and 2) that the Justice Department would notify criminal defendants who have been spied on under the Fisa Amendments Act, so there exists some way to challenge the law in court. It turns out that neither of those statements were true. One of the most explosive Snowden revelations exposed a then-secret technique known as "about" surveillance. As the New York Timesfirst reported, the NSA "is searching the contents of vast amounts of Americans' e-mail and text communications into and out of the country, hunting for people who mention information about foreigners under surveillance." In other words, the NSA doesn't just target a contact overseas – it sweeps up everyone's international communications into a dragnet and searches them for keywords. The Snowden leaks also pushed the Justice Department to admit ... that the government hadn't been notifying any defendants they were being charged based on NSA surveillance.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.

Glenn Greenwald: from Martin Luther King to Anonymous, the state targets dissenters not just "bad guys"

The opportunity those in power have to characterise political opponents as "national security threats" or even "terrorists" has repeatedly proven irresistible. In the past decade, the government ... has formally so designated environmental activists, broad swaths of anti-government rightwing groups, anti-war activists, and associations organised around Palestinian rights. One document from the Snowden files, dated 3 October 2012, chillingly underscores the point. It revealed that the agency has been monitoring the online activities of individuals it believes express "radical" ideas and who have a "radicalising" influence on others. Among the information collected about the individuals, at least one of whom is a "US person", are details of their online sex activities and "online promiscuity." The agency discusses ways to exploit this information to destroy their reputations and credibility. The record is suffused with examples of groups and individuals being placed under government surveillance by virtue of their dissenting views and activism – Martin Luther King, the civil rights movement, anti-war activists, environmentalists. The NSA's treatment of Anonymous ... is especially troubling and extreme. Gabriella Coleman, a specialist on Anonymous at McGill University, said that [Anonymous] "is not a defined" entity but rather "an idea that mobilises activists to take collective action and voice political discontent. It is a broad-based global social movement with no centralised or official organised leadership structure. Some have rallied around the name to engage in digital civil disobedience, but nothing remotely resembling terrorism."

Note: This excerpt is from the new book No Place to Hide by Glenn Greenwald. For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.

When NSA contractor Edward Snowden downloaded tens of thousands of top-secret documents from a highly secure government network, it led to the largest leak of classified information in history — and sparked a fierce debate over privacy, technology and democracy in the post-9/11 world. Now, in "United States Of Secrets," FRONTLINE goes behind the headlines to reveal the dramatic inside story of how the U.S. government came to monitor and collect the communications of millions of people around the world—including ordinary Americans—and the lengths they went to trying to hide the massive surveillance program from the public. “This is as close to the complete picture as anyone has yet put together — and it’s bigger and more pervasive than we thought,” says veteran FRONTLINE filmmaker Michael Kirk. In part one ... Kirk [pieces] together the secret history of the unprecedented surveillance program that began in the wake of September 11 and continues today – even after the revelations of its existence by Edward Snowden. Then, in part two, premiering Tuesday, May 20 ..., veteran FRONTLINE filmmaker Martin Smith continues the story, exploring the secret relationship between Silicon Valley and the National Security Agency, and investigating how the government and tech companies have worked together to gather and warehouse your data. “Through in-depth interviews with more than 60 whistleblowers, elected officials, journalists, intelligence insiders and cabinet officials, we have woven together the secret narrative that reveals the scale and scope of the government’s spying program,” says Kirk.

Note: Don't miss this engaging program, available at this link. For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.

Glenn Greenwald: the explosive day we revealed Edward Snowden's identity to the world

On Sunday 9 June 2013, the Guardian published the story that revealed [Edward] Snowden to the world. The article told Snowden's story, conveyed his motives, and proclaimed that "Snowden will go down in history as one of America's most consequential whistleblowers, alongside Daniel Ellsberg and Bradley [now Chelsea] Manning." We quoted [a note from Snowden that said:] "I understand that I will be made to suffer for my actions … but I will be satisfied if the federation of secret law, unequal pardon and irresistible executive powers that rule the world that I love are revealed even for an instant." The reaction to the article and the video was more intense than anything I had experienced as a writer. Ellsberg himself, writing the following day in the Guardian, proclaimed that "there has not been in American history a more important leak than Edward Snowden's release of NSA material – and that definitely includes the Pentagon Papers 40 years ago". Several hundred thousand people posted the link to their Facebook accounts in the first several days alone. Almost three million people watched the interview on YouTube. Many more saw it on the Guardian's website. The overwhelming response was shock and inspiration at Snowden's courage.

Note: Don't miss the full, exciting story of how Snowden originally came to leak his stunning information at the link above. This excerpt is from the new book No Place to Hide by Glenn Greenwald. For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.

Snowden: Why hasn’t the Director of National Intelligence been punished for lying to Congress

Former National Security Agency contractor Edward Snowden, and one of the reporters who first broke the news of Snowden's documents, Laura Poitras, received a Ridenhour Truth-Teller prize [on April 30] to a standing ovation at the National Press Club. Snowden leaked classified documents that exposed the NSA's massive global surveillance programs. Snowden ... compared his actions with that of Director of National Intelligence James R. Clapper, who denied that the NSA was "wittingly" collecting data on millions of Americans in a Senate Intelligence Committee hearing last spring -- a claim at odds with revelations about domestic phone records collection as a result of documents provided by Snowden. "The oath that I remember is James Clapper raising his hand, swearing to tell the truth and then lying to the American public," Snowden said. "I also swore an oath, but that oath was not to secrecy, but to defend the American Constitution." While Clapper has accused Snowden of perpetrating the most "massive and damaging theft of intelligence" in U.S. history, Snowden argues his actions were serving a larger public interest that superseded the national intelligence need for secrecy. Later in the speech, he described Clapper as having "committed a crime by lying under oath to the American people," and questioned why charges were never brought against the director. By contrast, Snowden said, charges were brought against him soon after he revealed himself as the source of the leaks.

Note: For more on the construction of a total surveillance state, see the deeply revealing reports from reliable major media sources available here.

Britain’s electronic surveillance agency, Government Communications Headquarters [GCHQ], has long presented its collaboration with the National Security Agency’s massive electronic spying efforts as proportionate, carefully monitored, and well within the bounds of privacy laws. But according to a top-secret document in the archive of material provided to The Intercept by NSA whistleblower Edward Snowden, GCHQ secretly coveted the NSA’s vast troves of private communications and sought “unsupervised access” to its data as recently as last year. The document, dated April 2013, reveals that GCHQ requested broad new authority to tap into data collected under a law that authorizes a variety of controversial NSA surveillance initiatives, including the PRISM program. PRISM is a system used by the NSA and the FBI to obtain the content of personal emails, chats, photos, videos, and other data processed by nine of the world’s largest internet companies, including Google, Yahoo!, Microsoft, Apple, Facebook, and Skype. The arrangement GCHQ proposed would also have provided the British agency with greater access to millions of international phone calls and emails that the NSA siphons directly from phone networks and the internet. The Snowden files do not indicate whether NSA granted GCHQ’s request, but they do show that the NSA was “supportive” of the idea, and that GCHQ was permitted extensive access to PRISM during the London Olympics in 2012. The request for the broad access was communicated at “leadership” level.

Note: For more on the construction of a total surveillance state, see the deeply revealing reports from reliable major media sources available here.

Two news organizations' stories about National Security Agency surveillance, based upon documents leaked by Edward Snowden, have been awarded the Pulitzer Prize for public service, often described as the highest prize in American journalism. The Washington Post and ... The Guardian each received the prize on [April 14]. The recognition of the NSA reporting was most significant because of the questions raised by Snowden's leaks and the reaction to them. Snowden, who has been living in Russia while seeking asylum from U.S. prosecution, said in a statement that the Pulitzer board's recognition of the coverage was "vindication for everyone who believes that the public has a role in government."
"We owe it to the efforts of the brave reporters and their colleagues who kept working in the face of extraordinary intimidation, including the forced destruction of journalistic materials, the inappropriate use of terrorism laws, and so many other means of pressure to get them to stop what the world now recognizes was work of vital public importance." While Snowden provided a trove of documents, reporters including Glenn Greenwald, working for the Guardian; Barton Gellman, working for The Post; and Laura Poitras, who worked with both, pored over the raw information, decided with their editors what parts were ethical to publish, and turned the information into stories that stunned readers around the world.

Note: For more on the historic Snowden revelations, see the deeply revealing reports from reliable major media sources available here.

The National Security Agency has built a surveillance system capable of recording “100 percent” of a foreign country’s telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place, according to people with direct knowledge of the effort and documents supplied by former contractor Edward Snowden. A senior manager for the program compares it to a time machine — one that can replay the voices from any call without requiring that a person be identified in advance for surveillance. The voice interception program, called MYSTIC, began in 2009. Its RETRO tool, short for “retrospective retrieval,” and related projects reached full capacity against the first target nation in 2011. Planning documents two years later anticipated similar operations elsewhere. In the initial deployment, collection systems are recording “every single” conversation nationwide, storing billions of them in a 30-day rolling buffer that clears the oldest calls as new ones arrive, according to a classified summary. Analysts listen to only a fraction of 1 percent of the calls, but the absolute numbers are high. Each month, they send millions of voice clippings, or “cuts,” for processing and long-term storage. At the request of U.S. officials, The Washington Post is withholding details that could be used to identify the country where the system is being employed or other countries where its use was envisioned.

Note: Though technically it is illegal for the NSA to snoop on Americans without good cause, all they have to do is to share this technology with another country like the UK, and then ask the UK to do the snooping and send the results back to them, thereby circumventing the law. For more on NSA surveillance, see the deeply revealing reports from reliable major media sources available here.

Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks. The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic. In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.

The National Security Agency has reportedly used automated systems to infect user computers with malware since 2010. At times the agency pretended to be Facebook to install its malware. The NSA has been using a program codenamed TURBINE to contaminate computers and networks with malware "implants" capable of spying on users, according to the Intercept, which cited documents provided by whistleblower Edward Snowden. Between 85,000 and 100,000 of these implants have been deployed worldwide thus far. To infect computers with malware, the NSA has relied on various tactics, including posing as Facebook. The federal agency performed what is known as a "man-on-the-side" attack in which it tricked users computers into thinking that they were accessing real Facebook servers. Once the user had been fooled, the NSA hacked into the user's computer and extracted data from their hard drive. Facebook said it had no knowledge of the NSA"s TURBINE program. However, [Facebook] said it is no longer possible for the NSA or hackers to attack users that way, but Facebook warned that other websites and social networks may still be vulnerable to those types of attacks. "This method of network level disruption does not work for traffic carried over HTTPS, which Facebook finished integrating by default last year," Facebook told the National Journal.

Note: For more on NSA surveillance, see the deeply revealing reports from reliable major media sources available here.

As staff for the Senate Intelligence Committee gathered information to conduct oversight of the CIA, the CIA was secretly monitoring them, according to reports from McClatchy [News] and the New York Times. The committee staff was reviewing documents in a secure room at CIA headquarters as part of its investigation into the CIA's now-defunct detention and interrogation program, but the agency was secretly monitoring their work, according to reports. Complaints about the spying have reportedly prompted the CIA inspector general -- the agency's internal watchdog -- to look into the agency's behavior. Sen. Mark Udall, D-Colo., seemed to reference the surveillance in a letter to President Obama ... in which he urged the president to support the fullest declassification of the committee's CIA report. "As you are aware, the C.I.A. has recently taken unprecedented action against the committee in relation to the internal C.I.A. review, and I find these actions to be incredibly troubling for the committee's oversight responsibilities and for our democracy," Udall wrote. "It is essential that the Committee be able to do its oversight work -- consistent with our constitutional principle of the separation of powers -- without the CIA posing impediments or obstacles as it is today." Sen. Martin Heinrich, D-N.M., another member of the intelligence committee, declared in a statement Wednesday, "The Senate Intelligence Committee oversees the CIA, not the other way around."

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.

Britain's surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal. GCHQ files dating between 2008 and 2010 explicitly state that a surveillance program codenamed Optic Nerve collected still images of Yahoo webcam chats in bulk and saved them to agency databases, regardless of whether individual users were an intelligence target or not. In one six-month period in 2008 alone, the agency collected webcam imagery – including substantial quantities of sexually explicit communications – from more than 1.8 million Yahoo user accounts globally. Yahoo ... denied any prior knowledge of the program, accusing the agencies of "a whole new level of violation of our users' privacy". Optic Nerve, the documents provided by NSA whistleblower Edward Snowden show, began as a prototype in 2008 and was still active in 2012. The system, eerily reminiscent of the telescreens evoked in George Orwell's Nineteen Eighty-Four, was used for experiments in automated facial recognition, to monitor GCHQ's existing targets, and to discover new targets of interest. Such searches could be used to try to find terror suspects or criminals making use of multiple, anonymous user IDs.
Rather than collecting webcam chats in their entirety, the program saved one image every five minutes from the users' feeds ... to avoid overloading GCHQ's servers. The documents describe these users as "unselected" – intelligence agency parlance for bulk rather than targeted collection.

Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.

New surveillance technology can track everyone in an area for several hours at a time

From 10,000 feet up, tracking an entire city at one glance: Ohio-based Persistent Surveillance Systems is trying to convince cities across the country that its surveillance technology can help reduce crime. Its new generation of camera technology is far more powerful than the police cameras to which America has grown accustomed. But these newer cameras have sparked some privacy concerns. A new, far more powerful generation is being quietly deployed [from small aircraft] that can track every vehicle and person across an area the size of a small city, for several hours at a time. Although these cameras can’t read license plates or see faces, they provide such a wealth of data that police, businesses and even private individuals can use them to help identify people and track their movements. Already, the cameras have been flown above major public events such as the Ohio political rally where Sen. John McCain named Sarah Palin as his running mate in 2008. They’ve been flown above Baltimore; Philadelphia; Compton, Calif.; and Dayton [OH] in demonstrations for police. They’ve also been used for traffic impact studies, [and] for security at NASCAR races. Defense contractors are developing similar technology for the military, but its potential for civilian use is raising novel civil liberties concerns. In Dayton, where Persistent Surveillance Systems is based, city officials balked last year when police considered paying for 200 hours of flights, in part because of privacy complaints. The Supreme Court generally has given wide latitude to police using aerial surveillance as long as the photography captures images visible to the naked eye.

Note: For more on surveillance by government agencies and corporations, see the deeply revealing reports from reliable major media sources available here.

An independent federal privacy watchdog has concluded that the National Security Agency’s program to collect bulk phone call records has provided only “minimal” benefits in counterterrorism efforts, is illegal and should be shut down. The findings are laid out in a 238-page report [that represents] the first major public statement by the Privacy and Civil Liberties Oversight Board, which Congress made an independent agency in 2007 and only recently became fully operational. The Obama administration has portrayed the bulk collection program as useful and lawful. But in its report, the board lays out what may be the most detailed critique of the government’s once-secret legal theory behind the program: that a law known as Section 215 of the Patriot Act, which allows the F.B.I. to obtain business records deemed “relevant” to an investigation, can be legitimately interpreted as authorizing the N.S.A. to collect all calling records in the country. The program “lacks a viable legal foundation under Section 215, implicates constitutional concerns under the First and Fourth Amendments, raises serious threats to privacy and civil liberties as a policy matter, and has shown only limited value,” the report said. “As a result, the board recommends that the government end the program.” The report also sheds light on the history of the once-secret bulk collection program. It contains the first official acknowledgment that the Foreign Intelligence Surveillance Court produced no judicial opinion detailing its legal rationale for the program until last August, even though it had been issuing orders to phone companies for the records and to the N.S.A. for how it could handle them since May 2006.

Note: The PCLOB report is titled "Report on the Telephone Records Program Conducted under Section 215 of the USA PATRIOT Act and on the
Operations of the Foreign Intelligence Surveillance Court," and is available here. For more on government attacks to privacy, see the deeply revealing reports from reliable major media sources available here.

The National Security Agency has collected almost 200 million text messages a day from across the globe, using them to extract data including location, contact networks and credit card details, according to top-secret documents. The NSA program, codenamed Dishfire, collects “pretty much everything it can”, according to GCHQ documents, rather than merely storing the communications of existing surveillance targets. The NSA has made extensive use of its vast text message database to extract information on people’s travel plans, contact books, financial transactions and more – including of individuals under no suspicion of illegal activity. On average, each day the NSA was able to extract: • More than 5 million missed-call alerts, for use in contact-chaining analysis (working out someone’s social network from who they contact and when) • Details of 1.6 million border crossings a day, from network roaming alerts • More than 110,000 names, from electronic business cards, which also included the ability to extract and save images. • Over 800,000 financial transactions, either through text-to-text payments or linking credit cards to phone users The agency was also able to extract geolocation data from more than 76,000 text messages a day, including from “requests by people for route info” and “setting up meetings”.

Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.

To have a genuinely constructive debate, data must be compiled, evidence must be amassed and verifiable truths must be presented. This truism is particularly significant when it comes to debates about security and liberty. Without facts, we get the counterproductive discourse we are being treated to right now - the one hijacked by National Security Administration defenders throwing temper tantrums, tossing out fear-mongering platitudes and trying to prevent any scrutiny of the agency. Tune into a national news program and you inevitably will hear pundits who have spent the last decade mindlessly cheering on wars and warrantless wiretapping now echoing the talking points emanating from surveillance-state apparatchiks like Reps. Mike Rogers, R-Mich., and Dutch Ruppersberger, D-Md. This week, these two lawmakers, who head the House Intelligence Committee, summarized all the bluster in a press release that should be enshrined for posterity. In an attempt to defend the NSA, the bipartisan duo breathlessly claimed that whistle-blower Edward Snowden ended up "endangering each and every American" by exposing the government's mass surveillance (i.e., metadata) programs. They indicted Snowden's patriotism and said his disclosures of the NSA's unlawful and unconstitutional programs "aligned him with our enemy." But the facts now leaking out of the government's national security apparatus are doing the opposite. They are debunking - rather than confirming - the NSA defenders' platitudes.

Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.

The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks. While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials. The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user. Among the most frequent targets of the N.S.A. and its Pentagon partner, United States Cyber Command, have been units of the Chinese Army, which the United States has accused of launching regular digital probes and attacks on American industrial and military targets, usually to steal secrets or intellectual property. But the program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan.

Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.

Taken together, the [Edward Snowden] revelations have brought to light a global surveillance system that cast off many of its historical restraints after the attacks of Sept. 11, 2001. Secret legal authorities empowered the NSA to sweep in the telephone, Internet and location records of whole populations. Six months after the first revelations ... Snowden agreed to reflect at length on the roots and repercussions of his choice. He was relaxed and animated over two days of nearly unbroken conversation. Snowden offered vignettes from his intelligence career and from his recent life as “an indoor cat” in Russia. But he consistently steered the conversation back to surveillance, democracy and the meaning of the documents he exposed. “For me, in terms of personal satisfaction, the mission’s already accomplished,” he said. “I already won. As soon as the journalists were able to work, everything that I had been trying to do was validated. Because, remember, I didn’t want to change society. I wanted to give society a chance to determine if it should change itself. All I wanted was for the public to be able to have a say in how they are governed,” he said. Snowden ... had come to believe that a dangerous machine of mass surveillance was growing unchecked. Closed-door oversight by Congress and the Foreign Intelligence Surveillance Court was a “graveyard of judgment,” he said, manipulated by the agency it was supposed to keep in check. The NSA’s business is “information dominance,” the use of other people’s secrets to shape events. At 29, Snowden upended the agency on its own turf.

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.

The White House's expert NSA panel may have made headlines ... for telling President Barack Obama to knock off the collection of Americans' meta-data, but surveillance experts said they were surprised that the panel also took to task some controversial non-NSA-related spy tactics as well. One recommendation was to impose much stricter oversight on the FBI's ability to issue National Security Letters (NSLs), which have been used to obtain telephone call records and credit reports in terrorism and espionage cases. Another even more peculiar recommendation by the five national security experts ... was their advice that "governments" shouldn't hack into bank accounts and drain funds. "Governments should not use their offensive cyber capabilities to change the amounts held in financial accounts or otherwise manipulate the financial systems," the unanimous Review Group on Intelligence and Communications Technologies report warned Obama. "That was a strangely specific recommendation for something nobody was talking about," Kel McClanahan, executive director of government transparency group National Security Counselors, told ABC News. Michelle Richardson, the American Civil Liberties Union's legislative council in Washington, also said the findings on "NSLs" and government hacking were unexpected -- but welcomed.

Note: The fact that this expert panel would even mention governments manipulating financial accounts suggests that if it hasn't already happened, some were seriously considering this. For lots more on this strange news, click here. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.

British and American intelligence agencies had a comprehensive list of surveillance targets that included the EU's competition commissioner, German government buildings in Berlin and overseas, and the heads of institutions that provide humanitarian and financial help to Africa, top-secret documents reveal. The papers show GCHQ [and the NSA were] targeting organisations such as the United Nations development programme, the UN's children's charity Unicef and Médecins du Monde, a French organisation that provides doctors and medical volunteers to conflict zones. The head of the Economic Community of West African States (Ecowas) also appears in the documents, along with text messages he sent to colleagues. One GCHQ document, drafted in January 2009, makes clear that the agencies were targeting an email address listed as belonging to another important American ally – the "Israeli prime minister". Ehud Olmert was in office at the time. Three further Israeli targets appeared on GCHQ documents, including another email address understood to have been used to send messages between the then Israeli defence minister, Ehud Barak, and his chief of staff, Yoni Koren. The names and details are the latest revelations to come from documents leaked by the whistleblower Edward Snowden. They provoked a furious reaction. The disclosures reflect the breadth of targets sought by the agencies, which goes far beyond the desire to intercept the communications of potential terrorists and criminals, or diplomats and officials from hostile countries.

Note:Later reports revealed that GHCQ also targeted the global human rights organization Amnesty International. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.

As a key part of a campaign to embed encryption software that it could crack into widely used computer products, the U.S. National Security Agency arranged a secret $10 million contract with RSA, one of the most influential firms in the computer security industry. Documents leaked by former NSA contractor Edward Snowden show that the NSA created and promulgated a flawed formula for generating random numbers to create a "back door" in encryption products, the New York Times reported in September. Reuters later reported that RSA became the most important distributor of that formula by rolling it into a software tool called Bsafe that is used to enhance security in personal computers and many other products. Undisclosed until now was that RSA received $10 million in a deal that set the NSA formula as the preferred, or default, method for number generation in the BSafe software, according to two sources familiar with the contract. Although that sum might seem paltry, it represented more than a third of the revenue that the relevant division at RSA had taken in during the entire previous year. The RSA deal shows one way the NSA carried out what Snowden's documents describe as a key strategy for enhancing surveillance: the systematic erosion of security tools. NSA documents released in recent months called for using "commercial relationships" to advance that goal, but did not name any security companies as collaborators.

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.

A participant in a White House-sponsored review of surveillance activities described as “shameful” an apparent decision to leave most of the National Security Agency’s controversial bulk spying intact. Sascha Meinrath, director of the Open Technology Institute, said [on December 13] that ... “The review group was searching for ways to make the most modest pivot necessary to continue business as usual.” Should the review group’s report resemble descriptions that leaked ... the report “does nothing to alter the lack of trust the global populace has for what the US is doing, and nothing to restore our reputation as an ethical internet steward,” said Meinrath, who met with the advisory panel and White House officials twice to discuss the bulk surveillance programs that have sparked international outrage. Leaks about the review group’s expected recommendations to the New York Times and Wall Street Journal strengthened Meinrath and other participants’ long-standing suspicions that much of the NSA’s sweeping spy powers would survive. The Times quoted an anonymous official familiar with the group saying its report “says we can’t dismantle these programs, but we need to change the way almost all of them operate”. According to the leaks, the review group will recommend that bulk collection of every American’s phone call data continue, possibly by the phone companies instead of the NSA, with tighter restrictions than the “reasonable, articulable suspicion” standard for searching through them that the NSA currently employs.

Note: For more on massive government intrusions of citizens' privacy, see the deeply revealing reports from reliable major media sources available here.

The National Security Agency isn't the only government entity secretly collecting data from people's cellphones. Local police are increasingly scooping it up, too.
Armed with new technologies, including mobile devices that tap into cellphone data in real time, dozens of local and state police agencies are capturing information about thousands of cellphone users at a time, whether they are targets of an investigation or not. The records, from more than 125 police agencies in 33 states, reveal [that] about one in four law-enforcement agencies have used a tactic known as a "tower dump," which gives police data about the identity, activity and location of any phone that connects to the targeted cellphone towers over a set span of time, usually an hour or two. A typical dump covers multiple towers, and wireless providers, and can net information from thousands of phones. At least 25 police departments own a Stingray, a suitcase-size device that costs as much as $400,000 and acts as a fake cell tower. The system, typically installed in a vehicle so it can be moved into any neighborhood, tricks all nearby phones into connecting to it and feeding data to police. In some states, the devices are available to any local police department via state surveillance units. Organizations such as the American Civil Liberties Union and Electronic Privacy Information Center say the swelling ability by even small-town police departments to easily and quickly obtain large amounts of cellphone data raises questions about the erosion of people's privacy as well as their Fourth Amendment protections against unreasonable search and seizure.

Note: For more on massive government intrusions of citizens' privacy, see the deeply revealing reports from reliable major media sources available here.

British and U.S. intelligence officials say they are worried about a "doomsday" cache of highly classified, heavily encrypted material they believe former National Security Agency contractor Edward Snowden has stored on a data cloud. The cache contains documents generated by the NSA and other agencies and includes names of U.S. and allied intelligence personnel, seven current and former U.S. officials and other sources briefed on the matter said. One source described the cache of still unpublished material as Snowden's "insurance policy" against arrest or physical harm. U.S. officials and other sources said only a small proportion of the classified material Snowden downloaded during stints as a contract systems administrator for NSA has been made public. Some Obama Administration officials have said privately that Snowden downloaded enough material to fuel two more years of news stories. "The worst is yet to come," said one former U.S. official who follows the investigation closely. Snowden ... is believed to have downloaded between 50,000 and 200,000 classified NSA and British government documents. [It is] estimated that the total number of Snowden documents made public so far is over 500. Glenn Greenwald, who met with Snowden in Hong Kong and was among the first to report on the leaked documents for the Guardian newspaper, said the former NSA contractor had "taken extreme precautions to make sure many different people around the world have these archives to insure the stories will inevitably be published."

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.

Jimmy Wales, the founder of Wikipedia, has called on Barack Obama to rein in the National Security Agency as he described the whistleblower Edward Snowden as "a hero" whom history will judge "very favourably". Wales called for a "major re-evaluation" of the NSA, adding that the public "would have never approved this sweeping surveillance program" had it been put to a vote. The revelations, Wales said, had been "incredibly damaging and embarrassing to the US. It makes it very difficult for someone like me to go out, as I do, [to] speak to people in authoritarian countries, and say: 'You shouldn’t be spying on activists, you shouldn’t be censoring the internet', when we [in the US] are complicit in these acts of extraordinary intrusion into people’s personal lives. [Snowden] has exposed what I believe to be criminal wrongdoing, lying to Congress, and certainly [an] affront to the Fourth Amendment. I think that history will judge him very favourably. There is a growing sense of concern in Congress about this, a growing sense in Congress that public is angry about this, that they have been misled and I think we are going to see legislation to change this."

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.

The phone, internet and email records of UK citizens not suspected of any wrongdoing have been analysed and stored by America's National Security Agency under a secret deal that was approved by British intelligence officials, according to documents from the whistleblower Edward Snowden. In the first explicit confirmation that UK citizens have been caught up in US mass surveillance programs, an NSA memo describes how in 2007 an agreement was reached that allowed the agency to "unmask" and hold on to personal data about Britons that had previously been off limits. The memo ... says the material is being put in databases where it can be made available to other members of the US intelligence and military community.
Until now, it had been generally understood that the citizens of each country were protected from surveillance by any of the others. But the Snowden material reveals that: • In 2007, the rules were changed to allow the NSA to analyse and retain any British citizens' mobile phone and fax numbers, emails and IP addresses swept up by its dragnet. • These communications were "incidentally collected" by the NSA, meaning the individuals were not the initial targets of surveillance operations and therefore were not suspected of wrongdoing. • The NSA has been using the UK data to conduct so-called "pattern of life" or "contact-chaining" analyses, under which the agency can look up to three "hops" away from a target of interest – examining the communications of a friend of a friend of a friend. Three hops for a typical Facebook user could pull the data of more than 5 million people into the dragnet.

Note: For more on government threats to privacy, see the deeply revealing reports from reliable major media sources available here.

FISA court order that allowed NSA surveillance is revealed for first time

A secret court order that authorised a massive trawl by the National Security Agency of Americans' email and internet data was published for the first time on [November 18], among a trove of documents that also revealed a judge's concern that the NSA "continuously" and "systematically" violated the limits placed on the program. Another later court order found that what it called "systemic overcollection" had taken place. In a heavily redacted opinion Colleen Kollar-Kotelly, the former presiding judge of the FISA court, placed legal weight on the methods of surveillance employed by the NSA, which had never before collected the internet data of “an enormous volume of communications”. The methods, known as pen registers and trap-and-trace devices, record the incoming and outgoing routing information of communications. Kollar-Kotelly ruled that acquiring the metadata, and not the content, of email and internet usage in bulk was harmonious with the “purpose” of Congress and prior court rulings – even though no surveillance statute ever authorized it and top officials at the Justice Department and the FBI threatened to resign in 2004 over what they considered its dubious legality. The type of data collected under the program included information on the "to", "from" and "bcc" lines of an email rather than the content. Metadata, wrote Kollar-Kotelly, enjoyed no protection under the fourth amendment to the US constitution, a precedent established by the Supreme Court in 1979 in a single case on which the NSA relies currently.

Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.

“The Brothers” is a riveting chronicle of government-sanctioned murder, casual elimination of “inconvenient” regimes, relentless prioritization of American corporate interests and cynical arrogance on the part of two men. John Foster Dulles and his brother, Allen, were ... lawyers, partners in the immensely powerful firm of Sullivan & Cromwell. John Foster Dulles served as secretary of state from 1953 to 1959; his brother ran the C.I.A. from 1953 to 1961. In his detailed, well­constructed and highly readable book, Stephen Kinzer ... shows how the brothers drove America’s interventionist foreign policy. Kinzer highlights John Foster Dulles’s central role in channeling funds from the United States to Nazi Germany in the 1930s. Sullivan & Cromwell floated bonds for Krupp A. G., the arms manufacturer, and also worked for I. G. Farben, the chemicals conglomerate that later manufactured Zyklon B, the gas used to murder millions of Jews. For the Dulles brothers, and for much of the American government, threats to corporate interests were categorized as support for communism. There are also reminders in Kinzer’s book of dark events in the history of American intelligence. Sixty years ago, Frank Olson, a C.I.A. officer, was reported to have jumped to his death during mind-control experiments “in which psychoactive drugs were administered to unknowing victims.” But last year, Kinzer reports, Olson’s family filed suit, claiming he had actually been murdered after visiting secret C.I.A. prisons in Europe.

Note: For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.

When Ban Ki-moon, the United Nations secretary general, sat down with President Obama at the White House in April to discuss Syrian chemical weapons, Israeli-Palestinian peace talks and climate change, it was a cordial, routine exchange. The National Security Agency nonetheless went to work in advance and intercepted Mr. Ban’s talking points for the meeting, a feat the agency later reported as an “operational highlight” in a weekly internal brag sheet. It was emblematic of an agency that for decades has operated on the principle that any eavesdropping that can be done on a foreign target of any conceivable interest — now or in the future — should be done. After all, American intelligence officials reasoned, who’s going to find out? From thousands of classified documents, the National Security Agency emerges as an electronic omnivore of staggering capabilities, eavesdropping and hacking its way around the world to strip governments and other targets of their secrets, all the while enforcing the utmost secrecy about its own operations. It spies routinely on friends as well as foes, as has become obvious in recent weeks; the agency’s official mission list includes using its surveillance powers to achieve “diplomatic advantage” over such allies as France and Germany and “economic advantage” over Japan and Brazil, among other countries. The scale of eavesdropping by the N.S.A., with 35,000 workers and $10.8 billion a year, sets it apart.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.

The German, French, Spanish and Swedish intelligence services have all developed methods of mass surveillance of internet and phone traffic over the past five years in close partnership with Britain's GCHQ eavesdropping agency. The bulk monitoring is carried out through direct taps into fibre optic cables and the development of covert relationships with telecommunications companies. A loose but growing eavesdropping alliance has allowed intelligence agencies from one country to cultivate ties with corporations from another to facilitate the trawling of the web, according to GCHQ documents leaked by the former US intelligence contractor Edward Snowden. The files also make clear that GCHQ played a leading role in advising its European counterparts how to work around national laws intended to restrict the surveillance power of intelligence agencies. US intelligence officials have insisted the mass monitoring was carried out by the security agencies in the countries involved and shared with the US. The Guardian revealed the existence of GCHQ's Tempora programme, in which the electronic intelligence agency tapped directly into the transatlantic fibre optic cables to carry out bulk surveillance. GCHQ officials expressed admiration for the technical capabilities of German intelligence to do the same thing, [saying] the Federal Intelligence Service (BND) had "huge technological potential and good access to the heart of the internet – they are already seeing some bearers running at 40Gbps and 100Gbps". Bearers is the GCHQ term for the fibre optic cables, and gigabits per second (Gbps) measures the speed at which data runs through them.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.

The widespread surveillance of Spanish citizens by the US National Security Agency, which caused outrage when it was reported this week, was the product of a collaboration with Spain's intelligence services, according to one Spanish newspaper. Spanish agents not only knew about the work of the NSA but also facilitated it, El Mundo reports. An NSA document entitled "Sharing computer network operations cryptologic information with foreign partners" reportedly shows how the US relies on the collaboration of many countries to give it access to intelligence information, including electronic metadata. According to the document seen by El Mundo, the US classifies cooperation with various countries on four different levels. In the first group – "Comprehensive Cooperation" – are the UK, Australia, Canada and New Zealand. The second group – "Focused Cooperation" – of which Spain is a member, includes 19 countries, all of them European, apart from Japan and South Korea. The third group – "Limited cooperation" – consists of countries such as France, Israel, India and Pakistan; while the fourth – "Exceptional Cooperation" – is made up of countries that the US considers to be hostile to its interests. The NSA documents [suggest] the Spanish intelligence services were working hand in hand with the NSA, as were other foreign agencies. But if there was any doubt as to who held the upper hand, the NSA documents make clear that any collaboration was always to serve the needs of protecting American interests.

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.

NSA monitored calls of 35 world leaders after US official handed over contacts

The National Security Agency monitored the phone conversations of 35 world leaders after being given the numbers by an official in another US government department, according to a classified document provided by whistleblower Edward Snowden. The confidential memo reveals that the NSA encourages senior officials in its "customer" departments, such as the White House, State and the Pentagon, to share their "Rolodexes" so the agency can add the phone numbers of leading foreign politicians to their surveillance systems. The document notes that one unnamed US official handed over 200 numbers, including those of the 35 world leaders, none of whom is named. These were immediately "tasked" for monitoring by the NSA. The revelation is set to add to mounting diplomatic tensions between the US and its allies, after the German chancellor Angela Merkel ... accused the US of tapping her mobile phone. The NSA memo obtained by the Guardian suggests that such surveillance was not isolated, as the agency routinely monitors the phone numbers of world leaders – and even asks for the assistance of other US officials to do so. The memo, dated October 2006 and which was issued to staff in the agency's Signals Intelligence Directorate (SID), was titled "Customers Can Help SID Obtain Targetable Phone Numbers". In the wake of the Merkel row, the US is facing growing international criticism that any intelligence benefit from spying on friendly governments is far outweighed by the potential diplomatic damage.

Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.

What are we to make of Edward Snowden? I know what I once made of him. He was no real whistleblower, I wrote, but “ridiculously cinematic” and “narcissistic” as well. As time has proved, my judgments were just plain wrong. Whatever Snowden is, he is curiously modest and has bent over backward to ensure that the information he has divulged has done as little damage as possible. As a “traitor,” he lacks the requisite intent and menace. But traitor is what Snowden has been roundly called. Harry Reid: “I think Snowden is a traitor.” John Boehner: “He’s a traitor.” Rep. Peter King: “This guy is a traitor; he’s a defector.” And Dick Cheney not only denounced Snowden as a “traitor” but also suggested that he might have shared information with the Chinese. This innuendo, as with Saddam Hussein’s weapons of mass destruction, is more proof of Cheney’s unerring determination to be cosmically wrong. The early denunciations of Snowden now seem both over the top and beside the point. If he is a traitor, then which side did he betray and to whom does he now owe allegiance? Snowden seems to have sold out to no one. In fact, a knowledgeable source says that Snowden has not even sold his life story and has rebuffed offers of cash for interviews. Maybe his most un-American act is passing up a chance at easy money. Someone ought to look into this. Snowden’s residency in Russia has been forced upon him — he had nowhere else to go. Snowden insists that neither the Russians nor, before them, the Chinese have gotten their grubby hands on his top-secret material.

Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.

Edward J. Snowden, the former National Security Agency contractor, said in an extensive interview this month that he did not take any secret N.S.A. documents with him to Russia when he fled there in June, assuring that Russian intelligence officials could not get access to them. He also asserted that he was able to protect the documents from China’s spies because he was familiar with that nation’s intelligence abilities, saying that as an N.S.A. contractor he had targeted Chinese operations and had taught a course on Chinese cybercounterintelligence. “There’s a zero percent chance the Russians or Chinese have received any documents,” he said. Mr. Snowden added that inside the spy agency “there’s a lot of dissent.” But he said that people were kept in line through “fear and a false image of patriotism,” which he described as “obedience to authority.” He said he believed that if he tried to question the N.S.A.’s surveillance operations as an insider, his efforts “would have been buried forever,” and he would “have been discredited and ruined.” Mr. Snowden said he finally decided to act when he discovered a copy of a classified 2009 inspector general’s report on the N.S.A.’s warrantless wiretapping program during the Bush administration. After reading about the program, which skirted the existing surveillance laws, he concluded that it had been illegal, he said. “If the highest officials in government can break the law without fearing punishment or even any repercussions at all,” he said, “secret powers become tremendously dangerous.”

Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.

Federal grants of $7 million, initially intended to help thwart terror attacks at the port in Oakland, Calif., are instead going to a police initiative that will collect and analyze reams of surveillance data. The new system ... is the latest example of how cities are compiling and processing large amounts of information, known as big data, for routine law enforcement. And the system underscores how technology has enabled the tracking of people in many aspects of life. Like the Oakland effort, other pushes to use new surveillance tools in law enforcement are supported with federal dollars. The New York Police Department, aided by federal financing, has a big data system that links 3,000 surveillance cameras with license plate readers, radiation sensors, criminal databases and terror suspect lists. Police in Massachusetts have used federal money to buy automated license plate scanners. And police in Texas have bought a drone with homeland security money. [Critics] of the Oakland initiative, formally known as the Domain Awareness Center, [say] the program, which will create a central repository of surveillance information, will also gather data about the everyday movements and habits of law-abiding residents. Oakland has a contract with the Science Applications International Corporation, or SAIC, to build its system. That company has earned the bulk of its $12 billion in annual revenue from military contracts.

Note: For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.

The Snowden files: why the British public should be worried about GCHQ

The problem and the risk [with surveillance by GCHQ] comes in the area of mass capture of data, or strategic surveillance. This is the kind of intelligence gathering that sucks in data from everyone, everywhere: from phones, internet use from email to website visits, social networking, instant messaging and video calls, and even areas such as video gaming; in short, everything digital. In the US, the Prism programme may have given the NSA access to the servers of companies such as Google and Facebook; in the UK, GCHQ has gained a similar degree of access via its Tempora programme, and the two of them together have a cable- and network-tapping capabilities collectively called Upstream, which have the ability to intercept anything that travels over the internet. This data is fed into a database called XKeyscore, which allows analysts to extract information "in real time", ie immediately. What this adds up to is a new thing in human history: with a couple of clicks of a mouse, an agent of the state can target your home phone, or your mobile, or your email, or your passport number, or any of your credit card numbers, or your address, or any of your log-ins to a web service. Using that "selector", the state can get access to all the content of your communications, via any of those channels; can gather information about anyone you communicate with, can get a full picture of all your internet use, can track your location online and offline. It can, in essence, know everything about you, including – thanks to the ability to look at your internet searches – what's on your mind.

Note: For an excellent 15-minute BBC Newsnight interview with Glenn Greenwald defending Edward Snowden's release of secret documents, click here. For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.

Since 2010, the National Security Agency has been exploiting its huge collections of data to create sophisticated graphs of some Americans’ social connections that can identify their associates, their locations at certain times, their traveling companions and other personal information, according to newly disclosed documents and interviews with officials. The spy agency began allowing the analysis of phone call and e-mail logs in November 2010 to examine Americans’ networks of associations for foreign intelligence purposes after N.S.A. officials lifted restrictions on the practice, according to documents provided by Edward J. Snowden, the former N.S.A. contractor. The agency was authorized to conduct “large-scale graph analysis on very large sets of communications metadata without having to check foreignness” of every e-mail address, phone number or other identifier, the document said. The agency can augment the communications data with material from public, commercial and other sources, including bank codes, insurance information, Facebook profiles, passenger manifests, voter registration rolls and GPS location information, as well as property records and unspecified tax data, according to the documents. They do not indicate any restrictions on the use of such “enrichment” data, and several former senior Obama administration officials said the agency drew on it for both Americans and foreigners. Almost everything about the agency’s operations is hidden, and the decision to revise the limits concerning Americans was made in secret, without review by the nation’s intelligence court or any public debate.

Note: For an excellent 15-minute BBC Newsnight interview with Glenn Greenwald defending Edward Snowden's release of secret documents, click here. For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.

One of the most overlooked aspects of the NSA reporting in the US has been just how global of a story this has become. Last week it was revealed that Belgium's largest telecom, Belgacom, was the victim of a massive hacking attack which systematically compromised its system for as long as two years. Last week, using documents obtained from NSA whistleblower Edward Snowden, Laura Poitras and other Der Spiegel journalists reported in that paper that it was the GCHQ, Britain's intelligence agency, that was behind the attack. According to that report, the attack was carried out by targeting individual engineers at the telecom with malware that allowed GCHQ agents to "own" their computer and thus exploit their access to the telecommunications system. As the US and UK run around the world protesting the hacking activities of others and warning of the dangers of cyber-attacks, that duo is one of the most aggressive and malicious, if not the most aggressive and malicious, perpetrators of those attacks of anyone on the planet. Nobody hacks as prolifically and aggressively as the two countries who most vocally warn of the dangers of hacking. A coalition called Stop Watching Us has been formed by privacy and civil liberties groups from across the political spectrum. On October 26, the 12th anniversary of the enactment of the Patriot Act, they will hold an anti-surveillance rally in Washington DC.

Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.

The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents. The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show. Many users assume — or have been assured by Internet companies — that their data is safe from prying eyes, including those of the government, and the N.S.A. wants to keep it that way. The agency treats its recent successes in deciphering protected information as among its most closely guarded secrets, restricted to those cleared for a highly classified program code-named Bullrun, according to the documents, provided by Edward J. Snowden, the former N.S.A. contractor. Beginning in 2000, as encryption tools were gradually blanketing the Web, the N.S.A. invested billions of dollars in a clandestine campaign to preserve its ability to eavesdrop. Having lost a public battle in the 1990s to insert its own “back door” in all encryption, it set out to accomplish the same goal by stealth. The agency ... deployed custom-built, superfast computers to break codes, and began collaborating with technology companies in the United States and abroad to build entry points into their products [called "backdoors"].

Note: For an excellent article in the UK's respected Guardian on this, click here. For a guide from the Guardian on "How to remain secure against NSA surveillance", click here.

Revealed: how US and UK spy agencies defeat internet privacy and security

US and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails, according to top-secret documents revealed by former contractor Edward Snowden. The files show that the National Security Agency and its UK counterpart GCHQ have broadly compromised the guarantees that internet companies have given consumers to reassure them that their communications, online banking and medical records would be indecipherable to criminals or governments. The agencies, the documents reveal, have adopted a battery of methods in their systematic and ongoing assault on what they see as one of the biggest threats to their ability to access huge swathes of internet traffic – "the use of ubiquitous encryption across the internet". Those methods include covert measures to ensure NSA control over setting of international encryption standards, the use of supercomputers to break encryption with "brute force", and – the most closely guarded secret of all – collaboration with technology companies and internet service providers themselves. Through these covert partnerships, the agencies have inserted secret vulnerabilities – known as backdoors or trapdoors – into commercial encryption software. "Backdoors are fundamentally in conflict with good security," said Christopher Soghoian, principal technologist and senior policy analyst at the American Civil Liberties Union. "Backdoors expose all users of a backdoored system, not just intelligence agency targets, to heightened risk of data compromise."

Note: For an excellent article in the New York Times on this, click here. For a guide from the Guardian on "How to remain secure against NSA surveillance", click here.

The National Security Agency has broken privacy rules or overstepped its legal authority thousands of times each year since Congress granted the agency broad new powers in 2008, according to an internal audit and other top-secret documents.
Most of the infractions involve unauthorized surveillance of Americans or foreign intelligence targets in the United States, both of which are restricted by statute and executive order. They range from significant violations of law to typographical errors that resulted in unintended interception of U.S. e-mails and telephone calls. The documents, provided earlier this summer to The Washington Post by former NSA contractor Edward Snowden, include a level of detail and analysis that is not routinely shared with Congress or the special court that oversees surveillance. In one of the documents, agency personnel are instructed to remove details and substitute more generic language in reports to the Justice Department and the Office of the Director of National Intelligence. In one instance, the NSA decided that it need not report the unintended surveillance of Americans. The NSA audit obtained by The Post, dated May 2012, counted 2,776 incidents in the preceding 12 months of unauthorized collection, storage, access to or distribution of legally protected communications. Many involved failures of due diligence or violations of standard operating procedure. The most serious incidents included a violation of a court order and unauthorized use of data about more than 3,000 Americans and green-card holders.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.

XKeyscore: NSA tool collects 'nearly everything a user does on the internet'

A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden. The NSA boasts in training materials that the program, called XKeyscore, is its "widest-reaching" system for developing intelligence from the internet. The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10. "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email". Training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. One presentation claims the program covers "nearly everything a typical user does on the internet", including the content of emails, websites visited and searches, as well as their metadata. Analysts can also use XKeyscore and other NSA systems to obtain ongoing "real-time" interception of an individual's internet activity. XKeyscore provides the technological capability [to target] US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.

Note: For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.

Unmanned aerial vehicles, or UAVs, are in the news constantly, but what about unmanned underwater vehicles? They could also be important in both war and peace, which is why the Defense Department's research arm, DARPA, is looking into a mobile submarine base from which to launch drones. The project, still in the earliest stages, is called "Hydra," after the mythical beast whose heads multiplied upon being cut off. The idea is to create a sort of underwater version of an aircraft carrier. The Hydra, itself an unmanned underwater vehicle, would be stocked with drones of various kinds and capacities: circling overhead, scouting underwater for mines, or listening on the surface.

Note: For more on the US military and police use of drones both abroad and in the US, see the deeply revealing reports from reliable major media sources available here.

The American Civil Liberties Union is warning that law enforcement officials are using license plate scanners to amass massive and unregulated databases that can be used to track law-abiding citizens as their go about their daily lives. In a new report, "You Are Being Tracked: How License Plate Readers Are Being Used to Record Americans' Movements," the ACLU discusses the data culled from license plate scanners - cameras mounted on patrol cars, overpasses and elsewhere to record your license plate number and location at a given time. There are tens of thousands such cameras now in operation, according to the group, with the data in some cases being stored indefinitely. The ACLU report is the result of an analysis of 26,000 pages of documents from police departments around the country, obtained through nearly 600 [FOIA] requests. It finds that while some jurisdictions keep the information gleaned from the scanners for a short time ... many hold onto the data for years. The organization complains that there are "virtually no rules in place" to keep officials from tracking "everybody all the time." The ACLU also warns that the data is being fed into larger databases, with the private National Vehicle Location Service now holding more than 800 million license plate records. The group's database is used by more than 2,200 law enforcement customers. The [ACLU] report warns that the data can be used in an official capacity to spy on protesters or target communities based on their religious beliefs, or unofficially by a police officer who wants to keep an eye on a romantic rival.

Note: For more on privacy, see the deeply revealing reports from reliable major media sources available here.

Dozens of companies, non-profits and trade organizations including Apple, Google, and Facebook sent a letter [on July 18] pushing the Obama administration and Congress for more disclosures on the government's national security-related requests for user data. Together with LinkedIn, Yahoo!, Microsoft, Twitter and many others, the companies asked for more transparency of secret data gathering in the letter. Tech companies have been scrambling to assert their independence after documents leaked last month by former U.S. security contractor Edward Snowden suggested they had given the government direct access to their computers as part of the NSA's secret surveillance program called Prism. The classified nature of the data gathering has barred the participating companies from disclosing even their involvement, let alone the content of the requests. Some companies, including Facebook and Apple, in June struck an agreement with the government to release some information about the number of surveillance requests they receive. But they were limited to disclosing aggregate government requests for data without showing the split between surveillance and criminal requests, and only for a six-month period.

Note: For more on government and corporate privacy invasions, see the deeply revealing reports from reliable major media sources available here.

How Barrett Brown shone light on the murky world of security contractors [and is now jailed]

[Barrett] Brown is not a household name like Edward Snowden or Bradley Manning. But after helping expose a dirty tricks plot, he faces jail. Brown made a splash in February 2011 by helping to uncover "Team Themis", a project by intelligence contractors retained by Bank of America to demolish the hacker society known as Anonymous. The Team Themis story began in late 2010, when Julian Assange warned WikiLeaks would release documents outlining an "ecosystem of corruption [that] could take down a bank or two." Bank of America went into damage-control mode and, as the New York Times reported, assembled "a team of 15 to 20 top Bank of America officials … scouring thousands of documents in the event that they become public." Days later, Bank of America retained the well-connected law firm of Hunton & Williams [which] "proposed various schemes to attack" WikiLeaks. Its partners suggested creating false documents and fake personas to damage progressive organizations. The tech companies' emails – which Anonymous hacked and Barrett Brown helped publicize – listed planned tactics: "Feed[ing] the fuel between the feuding groups. Disinformation. Create messages around actions to sabotage or discredit the opposing organization. Submit fake documents and then call out the error." Brown [has] been cooling his heels in a jail outside Dallas ... awaiting two separate trials that could put him on ice for more than 100 years. In contrast to the FBI's aggressive pursuit of Brown, no probe of the Team Themis project was launched – despite a call from 17 US House representatives to investigate a possible conspiracy to violate federal laws.

Note: With the wide focus on the privatized national security state by the leaks from Edward Snowden, there is renewed interest in Brown's plight and the campaign for justice in his case. For more on this and to support Barret Brown, click here. For more on intelligence agency corruption, see the deeply revealing reports from reliable major media sources available here.

Bush-Era NSA Whistleblower Makes Most Explosive Allegations Yet About Extent of Gov’t Surveillance — and You Won’t Believe Who He Says They Spied On

Russ Tice, a former intelligence analyst and Bush-era NSA whistleblower, claimed Wednesday that the intelligence community has ordered surveillance on a wide range of groups and individuals, including high-ranking military officials, lawmakers and diplomats. “They went after – and I know this because I had my hands literally on the paperwork for these sort of things – they went after high-ranking military officers. They went after members of Congress, both Senate and the House, especially on the intelligence committees and on the armed services committees," [said] Tice. “But they went after other ones, too. They went after lawyers and law firms. They went after judges. One of the judges is now sitting on the Supreme Court. Two are former FISA court judges. They went after State Department officials. They went after people in the executive service that were part of the White House.” Then Tice dropped the bombshell about Obama. "In summer of 2004, one of the papers that I held in my hand was to wiretap a bunch of numbers associated with a 40-something-year-old wannabe senator for Illinois ... that’s the president of the United States now.” FBI whistleblower Sibel Edmonds and Tice agreed that such wide-ranging surveillance of officials could provide the intelligence agencies with unthinkable power to blackmail their opponents. “I was worried that the intelligence community now has sway over what is going on,” Tice said. Tice first blew the whistle on ... domestic spying across multiple agencies in 2005.

A bill that bans the wearing of masks during a riot or unlawful assembly and carries a maximum 10-year prison sentence ... became law today. The bill is meant to give police an added tool to prevent lawful protests from becoming violent riots, and that it will help police identify people who engage in vandalism or other illegal acts. The bill originally proposed a penalty of up to five years, but the House of Commons justice committee amended it and doubled the penalty to up to 10 years in prison for committing the offence. The bill didn't have unanimous support, and was opposed by some who are concerned about its effect on freedom of expression and privacy. Civil liberties advocates argued the measures could create a chilling effect on free speech and that peaceful protesters can unintentionally find themselves involved in an unlawful assembly. They also noted that there are legitimate reasons for wearing masks at protests; some may be worried about reprisals at work, for example, if sighted at a political protest. "Any law that infringes upon civil liberties needs to be held to a test of absolute necessity, and I don't think that test has been met in this instance," said Michael Byers, a political scientist at the University of British Columbia.

Note: Police seem to be specifically targeting the now popular Guy Falkes masks representing opposition to oppressive authority. For more on the erosion of civil liberties, see the deeply revealing reports from reliable major media sources available here.

Lawyers and intelligence experts with direct knowledge of two intercepted terrorist plots that the Obama administration says confirm the value of the NSA's vast data-mining activities have questioned whether the surveillance sweeps played a significant role, if any, in foiling the attacks. The defence of the controversial data collection operations ... has been led by Dianne Feinstein, chairwoman of the Senate intelligence committee, and her equivalent in the House, Mike Rogers. The two politicians have attempted to justify the NSA's use of vast data sweeps such as Prism and Boundless Informant by pointing to the arrests and convictions of would-be New York subway bomber Najibullah Zazi in 2009 and David Headley, who is serving a 35-year prison sentence for his role in the 2008 Mumbai attacks. But court documents lodged in the US and UK, as well as interviews with involved parties, suggest that data-mining through Prism and other NSA programmes played a relatively minor role in the interception of the two plots. Conventional surveillance techniques, in both cases including old-fashioned tip-offs from intelligence services in Britain, appear to have initiated the investigations. The Headley case is a peculiar choice for the administration to highlight as an example of the virtues of data-mining. The fact that the Mumbai attacks occurred, with such devastating effect, in itself suggests that the NSA's secret programmes were limited in their value as he was captured only after the event.Headley ... had been an informant working for the Drug Enforcement Administration perhaps as recently as 2005. There are suggestions that he might have then worked in some capacity for the FBI or CIA.

Note: For deeply revealing reports from reliable major media sources on the realities of intelligence agency activity, click here.

Connecting the Dots on PRISM, Phone Surveillance, and the NSA’s Massive Spy Center

Long before Edward Snowden walked out of the NSA with his trove of documents, whistleblowers there had been trying for years to bring attention to the massive turn toward domestic spying that the agency was making. Last year in my Wired cover story on the enormous new NSA data center in Utah, Bill Binney, the man who largely designed the agency’s worldwide eavesdropping system, warned of the secret, nationwide surveillance. He told how the NSA had gained access to billions of billing records not only from AT&T but also from Verizon. I also wrote about Adrienne J. Kinne, an NSA intercept operator who attempted to blow the whistle on the NSA’s illegal eavesdropping on Americans following the 9/11 attacks. She [attempted and failed] to end the illegal activity with appeals all the way up the chain of command to Major General Keith Alexander. The deception by General Alexander is especially troubling. In my new cover story for Wired’s July issue ...I show how he has become the most powerful intelligence chief in the nation’s history. Never before has anyone in America’s intelligence sphere come close to his degree of power, the number of people under his command, the expanse of his rule, the length of his reign, or the depth of his secrecy. A four-star Army general, his authority extends across three domains: He is director of the world’s largest intelligence service, the National Security Agency; chief of the Central Security Service; and commander of the U.S. Cyber Command. As such, he has his own secret military, presiding over the Navy’s 10th Fleet, the 24th Air Force, and the Second Army.

Note: James Bamford, the author of this article, was the ABC producer responsible for breaking the story on Operation Northwoods, which proved a level of deception almost beyond belief at the very highest levels of the Pentagon. For more on this, click here. For deeply revealing reports from reliable major media sources on the realities of intelligence agency activity, click here.

The Guardian [has] released a classified court order requiring Verizon to turn over records of all domestic phone calls to the National Security Agency. The revelation has led to a renewed debate over the legality and policy merits of indiscriminate government surveillance of Americans. The court order, issued by the secret Foreign Intelligence Surveillance court, only sought metadata — a fancy word for information like what numbers you called, what time you made the calls, and how long the calls were. The order does not seek the audio of calls. Of course, it’s possible the NSA has other programs collecting the contents of calls. In 2006 a whistleblower reported the existence of a secret, NSA-controlled room in an AT&T switching facility in San Francisco. So it’s possible the NSA is using rooms like that to listen to everyone’s phone calls. But all we know for sure is that the NSA has been requesting information about our phone calls. We only have proof of spying on Verizon customers, but it’s hard to imagine the NSA limiting its surveillance program to one company. There are probably similar orders in effect for AT&T and CenturyLink, the other major telephone companies. The order includes hints that the NSA is also collecting information from cellular customers. In addition to phone numbers and call times, the order seeks information about the specific cell phone tower the customer used to connect to the network during each call. Cellphones make calls using the closest tower. So if the NSA knows you made a call using a specific tower, they can safely assume you were near that tower at the time of the call.

Note: For graphs and lots more on the Prism program, see the Guardian article at this link. Technically, U.S. officials are not allowed to mine personal data from U.S. citizens. Yet if U.K. authorities mine data on U.S. citizens, they can share it freely with officials in the U.S. and vice versa. There is evidence that this happens quite frequently, thus circumventing privacy protections. For an excellent article which goes deep into this issue, click here.

Daniel Ellsberg: ‘I’m sure that President Obama would have sought a life sentence in my case’

[Daniel] Ellsberg is one of the most outspoken critics of the Obama administration’s prosecution of leakers. Under President Obama’s tenure, the government has prosecuted six individuals for releasing classified information to media organizations. Ellsberg is particularly fierce in his support of Bradley Manning, a young soldier who released a large amount of classified information to WikiLeaks. Manning was arrested in 2010, and his military court-martial began this week. Ellsberg considers Manning a hero, and he argues that there is little difference between what Manning did in 2010 and what Ellsberg did four decades earlier. [Q.}: In a 1973 interview, you said that a “secondary objective” of releasing the Pentagon Papers was “the hope of changing the tolerance of Executive secrecy that had grown up over the last quarter of a century both in Congress and the courts and in the public at large.” How has that “tolerance of secrecy” changed over the last four decades? DE: There’s been very great tolerance that if the magic words “national security,” or the new words “homeland security” are invoked, Congress has given the president virtually a free hand in deciding what information they will know as well as the public. I wouldn’t count on the current court with its current makeup making the same ruling with the Pentagon Papers as they did 40 years ago. I’m sure that President Obama would have sought a life sentence in my case. Various things that were counted as unconstitutional then have been put in the president’s hands now. He’s become an elected monarch. Nixon’s slogan, “when the president does it, it’s not illegal,” is pretty much endorsed now.

Note: To see key quotes showing the amazing courage and dedication of Snowden, click here. For deeply revealing reports from reliable major media sources on the realities of intelligence agency activity, click here.

CNN's Out Front with Erin Burnett [has been] focused on the possible involvement in the Boston Marathon attack of Katherine Russell, the 24-year-old American widow of the deceased suspect, Tamerlan Tsarnaev. Anonymous government officials are claiming that they are now focused on telephone calls between Russell and Tsarnaev that took place both before and after the attack to determine if she had prior knowledge of the plot or participated in any way. Burnett interviewed Tim Clemente, a former FBI counterterrorism agent, about whether the FBI would be able to discover the contents of past telephone conversations between the two. He quite clearly insisted that they could: BURNETT: There's no way they actually can find out what happened, right, unless she tells them? CLEMENTE: No, there is a way. We certainly have ways in national security investigations to find out exactly what was said in that conversation. We certainly can find that out. BURNETT: So they can actually get that? People are saying, look, that is incredible. CLEMENTE: No, welcome to America. All of that stuff is being captured as we speak whether we know it or like it or not. On Thursday night, Clemente again appeared on CNN. He reiterated what he said the night before but added expressly that "all digital communications in the past" are recorded and stored. All digital communications - meaning telephone calls, emails, online chats and the like - are automatically recorded and stored and accessible to the government after the fact. To describe that is to define what a ubiquitous, limitless Surveillance State is.

Note: All of our communications have been monitored by government computers for years. BBC News reported in this this 1999 article about the Echelon network which monitors all communications globally. For deeply revealing reports from reliable major media sources on government and corporate threats to privacy, click here.

The Obama administration is drawing up plans to give all U.S. spy agencies full access to a massive database that contains financial data on American citizens and others who bank in the country, according to a Treasury Department document. The proposed plan represents a major step by U.S. intelligence agencies to spot and track down [targeted persons] by bringing together financial databanks, criminal records and military intelligence. Financial institutions that operate in the United States are required by law to file reports of "suspicious customer activity," such as large money transfers or unusually structured bank accounts, to Treasury's Financial Crimes Enforcement Network (FinCEN). The Federal Bureau of Investigation already has full access to the database. However, intelligence agencies, such as the Central Intelligence Agency and the National Security Agency, currently have to make case-by-case requests for information to FinCEN. The Treasury plan would give spy agencies the ability to analyze more raw financial data than they have ever had before. Financial institutions file more than 15 million "suspicious activity reports" every year, according to Treasury. Banks, for instance, are required to report all personal cash transactions exceeding $10,000.

Note: For deeply revealing reports from reliable major media sources on the games intelligence agencies play, click here.

1.6 Billion Rounds Of Ammo For Homeland Security? It's Time For A National Conversation

The Denver Post, on February 15th, ran an Associated Press article entitled "Homeland Security aims to buy 1.6b rounds of ammo". It confirmed that the Department of Homeland Security has issued an open purchase order for 1.6 billion rounds of ammunition. Some of this purchase order is for hollow-point rounds, forbidden by international law for use in war, along with a frightening amount specialized for snipers. Also reported elsewhere, at the height of the Iraq War the Army was expending less than 6 million rounds a month. Therefore 1.6 billion rounds would be enough to sustain a hot war for 20+ years. DHS now is [also] showing off its acquisition of heavily armored personnel carriers, repatriated from the Iraqi and Afghani theaters of operation. The Department of Homeland Security is apparently taking delivery (apparently through the Marine Corps Systems Command, Quantico VA, via the manufacturer – Navistar Defense LLC) of an undetermined number of [recently retrofitted] ‘Mine Resistant Protected’ MaxxPro MRAP vehicles for service on the streets of the United States.” Why would they need such over-the-top vehicles on U.S. streets to withstand IEDs, mine blasts, and 50 caliber hits to bullet-proof glass? In a war zone… yes, definitely. [But] on the streets of America?

Note: For a U.S. Army field manual titled "Internment and Resettlement Operations" (FM 3-39.40) describing how large numbers of American citizens could be sent to internment camps if involved in "terrorist" activities,
click here. The introduction to this document states, "Commanders will use technology and conduct police intelligence operations to influence and control populations, evacuate detainees and, conclusively, transition rehabilitative and reconciliation operations to other functional agencies." For a disturbing report on the massive expansion of drones over US skies, click here.

Raytheon, a Massachusetts defense contractor, has built tracking software that pulls information from social networks, according to a video obtained by the Guardian newspaper in London. "[Raytheon] has acknowledged the technology was shared with U.S. government and industry as part of a joint research and development effort, in 2010, to help build a national security system capable of analyzing 'trillions of entities' from cyberspace." Using public data from Facebook, Twitter, Gowalla and Foursquare, the software - called RIOT, or Rapid Information Overlay Technology - apparently gathers uploaded information and forms a profile of a person's every move that was registered with one of the websites.
The video obtained by the newspaper starts with a demonstration by Raytheon's "principal investigator," Brian Urch, showing how easy it is to track an employee named Nick - a real person - based on all the places he has checked in using his smartphone. "When people take pictures and post them on the Internet using their smartphones, the phone will actually embed the latitude and longitude in the header data - so we're going to take advantage of that," Urch says. "So now we know where Nick's gone ... and now we'll predict where he'll be in the future." Urch goes on to analyze - using graphs and calendars - where Nick likes to spend his personal time and make predictions about his behavior. "If you ever wanted to get a hold of his laptop, you might want to visit the gym at 6 a.m. on Monday," Urch says with alarming casualness.

Rented computers from seven different companies secretly took photographs of their users, US authorities have said. The companies used software made by US company Designerware which could track key strokes and other personal data. The software, called PC Rental Agent, captured people engaging in "intimate acts", including sex. It is believed that PC Rental Agent has been installed in approximately 420,000 computers worldwide. The Federal Trade Commission ruling concerned a feature in the software, called Detective Mode, which would typically become activated if the user was late in returning equipment, or failed to pay for use. Detective Mode would assist the rental store in locating the overdue computer in order to pursue its return. Part of the process involved a pop-up window designed to look like a software registration screen. It would request personal information such as email addresses and telephone numbers that could then be used to pursue the users for payment and/or the return of equipment. In addition, the FTC said the software had access to much more sensitive information, including: usernames and passwords for email accounts, social media websites, and financial institutions. Among the other data collected were social security numbers; medical records; private emails to doctors; bank and credit card statements. Webcam pictures of children, partially undressed individuals, and intimate activities at home were also found. In the FTC's formal complaint document, it said the software had captured "couples engaged in sexual activities".

Note: Do you think other companies or intelligence agencies might be conducting similar monitoring? For more on this, click here.

[William] Binney, a 32-year veteran of the National Security Agency turned whistle-blower, ... described details about Stellar Wind, the N.S.A.’s top-secret domestic spying program begun after 9/11, which was so controversial that it nearly caused top Justice Department officials to resign in protest, in 2004. “The decision must have been made in September 2001,” Mr. Binney told me [and] cinematographer Kirsten Johnson. “That’s when the equipment started coming in.” He resigned over this in 2001 and began speaking out publicly in the last year. [Binney] is among a group of N.S.A. whistle-blowers, including Thomas A. Drake, who have each risked everything — their freedom, livelihoods and personal relationships — to warn Americans about the dangers of N.S.A. domestic spying. The N.S.A. has technical abilities that are nearly impossible to defend against if you are targeted. The 2008 amendments to the Foreign Intelligence Surveillance Act, which oversees the N.S.A. activities, are up for renewal in December. Two members of the Senate Select Committee on Intelligence, Senators Ron Wyden of Oregon and Mark Udall of Colorado ... have been warning about “secret interpretations” of laws and backdoor “loopholes” that allow the government to collect our private communications. Thirteen senators have signed a letter expressing concern about a “loophole” in the law that permits the collection of United States data. The A.C.L.U. and other groups have also challenged the constitutionality of the law, and the Supreme Court will hear arguments in that case on Oct. 29.

Note: The video about this on the NY Times webpage at the link above is quite revealing. One potent comment of this 32-year NSA veteran in the video is "They wanted to highly classify the extreme impeachable crimes they were committing." For deeply revealing reports from reliable major media sources on government and corporate surveillance, click here.

Last week, New York Mayor Michael Bloomberg joined NYPD Commissioner Ray Kelly to unveil a major new police surveillance infrastructure, developed by Microsoft. The Domain Awareness System links existing police databases with live video feeds, including cameras using vehicle license plate recognition software. No mention was made of whether the system plans to use – or already uses – facial recognition software. But, at present, there is no law to prevent US government and law enforcement agencies from building facial recognition databases. And we know from industry newsletters that the US military, law enforcement, and the department of homeland security are betting heavily on facial recognition technology. As PC World notes, Facebook itself is a market leader in the technology – but military and security agencies are close behind. According to Homeland Security Newswire, billions of dollars are being invested in the development and manufacture of various biometric technologies capable of detecting and identifying anyone, anywhere in the world – via iris-scanning systems, already in use; foot-scanning technology (really); voice pattern ID software, and so on. What is very obvious is that this technology will not be applied merely to people under arrest, or to people under surveillance in accordance with the fourth amendment. No, the "targets" here [include] everyone. In the name of "national security", the capacity is being built to identify, track and document any citizen constantly and continuously.

The Rothschild and Rockefeller families have teamed up to buy assets from banks and other distressed sellers in a union between two of the best-known names in financial history. RIT Capital Partners, which is chaired by Lord Rothschild, has taken a 37pc stake in Rockefeller Financial Services, the family’s wealth advisory and asset management wing. It has snapped up the holding from French bank Société Générale for less than Ł100m. The transatlantic alliance cements a five-decade acquaintance between the now ennobled Jacob Rothschild, 76, and David Rockefeller, 96, the grandson of the ruthlessly acquisitive American oilman and philanthropist John D Rockefeller. The two patricians now plan to capitalise on their family names to buy other asset managers or their portfolios, using their networks of top-notch contacts to ensure they get a seat at the table for any deal. The Rockefeller group goes back to 1882, set up to invest the family money made by John D Rockefeller’s Standard Oil, the forerunner for today’s Exxon Corporation, which he built with a Darwinian aggression. “Do you know the only thing that gives me pleasure? It’s to see my dividends coming in,” he once said. The Rothschild banking dynasty has its roots in the 18th century when Mayer Amschel Rothschild set up a business in Frankfurt. That sprang to fame in 1815 when it bought government bonds in anticipation of Napoleon’s defeat at Waterloo.

Note: Why is that these two hugely wealthy families get so little press coverage? Could it be that their wealth and influence exerts control over the major media? For more on secret societies which command huge hidden power, see the deeply revealing reports from reliable major media sources available here.

Rothschilds to merge British and French banking operations to secure control

The Rothschild dynasty is to merge its British and French banking operations to secure long-term control of the business and to boost the firm's financial strength ahead of the introduction of tougher capital requirements for banks. The 200-year-old banks will be reunited under a single shareholding that will bring together the fortunes of the French and English sides of the renowned family as they attempt to safeguard the business against the effects of new regulation and the fallout from the global financial crisis. Paris Orleans, the Rothschild Group's Paris-based holding company, will convert into a French limited partnership, securing the families' control of the bank against potential takeovers. The new partnership will then buy out minority investors in NM Rothschild & Sons, the UK business, as well as outstanding minority interests in the French operations. Paris Orleans has a market value of more than €500m (Ł415m) and is about 30pc owned by outside investors. The Rothschild Group employs 3,000 people in 42 countries and is one of the world's leading independent investment banks, advising some of the largest international companies on capital raisings and mergers and acquisitions. The bank also remains a player in the private equity industry and operates several merchant banking operations that invest directly in business across Europe and the rest of the world.

Note: Why is that these two hugely wealthy families get so little press coverage? Could it be that their wealth and influence exerts control over the major media? For more on secret societies which command huge hidden power, see the deeply revealing reports from reliable major media sources available here.

The U.S. government is legally justified in killing its own citizens overseas if they are involved in plotting terror attacks against America, Attorney General Eric Holder said [on March 5], offering the Obama administration's most detailed explanation so far of its controversial targeted killing program. The Fifth Amendment provides that no one can be "deprived of life" without due process of law. But that due process, Holder said, doesn't necessarily come from a court. "Due process and judicial process are not one and the same, particularly when it comes to national security. The Constitution guarantees due process, not judicial process," the attorney general said. The ACLU called Holder's explanation "a defense of the government’s chillingly broad claimed authority to conduct targeted killings of civilians, including American citizens, far from any battlefield without judicial review or public scrutiny." "Few things are as dangerous to American liberty as the proposition that the government should be able to kill citizens anywhere in the world on the basis of legal standards and evidence that are never submitted to a court, either before or after the fact," said Hina Shamsi, director of the ACLU’s National Security Project. "Anyone willing to trust President Obama with the power to secretly declare an American citizen an enemy of the state and order his extrajudicial killing should ask whether they would be willing to trust the next president with that dangerous power,” she said. The ACLU is suing the Obama administration, seeking to have documents regarding the targeted killing program made public.

Note: Attorney General Holder's claim that US citizens can be killed by the government without judicial process clearly violates the U.S. Bill of Rights. In addition to the Fifth Amendment that states that no person shall be held to answer for a crime "without due process of law," the Sixth Amendment states that "the accused shall enjoy the right to a speedy and public trial."

The Italian police ... arrested eight people on charges related to the seizure of $6 trillion in fake United States Treasury bonds, in a mysterious scheme that stretched from Hong Kong to Switzerland to the southern Italian region of Basilicata. The value of the seized bonds is in the neighborhood of half of the United States’ entire public debt of $15.36 trillion, but only the uninitiated would have accepted them as real securities. Rather than counterfeit, they were what officials call fictitious, printed in 6,000 units of $1 billion each, a denomination that does not exist and the equivalent of $3 bills. The United States Embassy in Rome said its experts had examined the bonds, which bore the date 1934, and determined that they were fictitious and apparently part of a scheme intended to defraud Swiss banks. According to the Federal Reserve, such “fictitious instrument fraud” is increasingly common, and unwitting investors have been cheated of nearly $10 billion in recent years. In a common ploy, “criminals present fictitious financial instruments such as Federal Reserve notes, standby letters of credit, prime bank guarantees or prime bank notes in order to fraudulently collateralize loans,” the Federal Reserve says on its Web site. In 2009, Italian police seized phony United States Treasury bonds with a face value of $250 billion.

Note: There is a major problem with the claim that these are fake. If you were a counterfeiter and wanted to fake bonds, you would have to be out of your mind to fake them in denominations of $1 billion. As reported here, no one would ever dream of cashing them. For excellent research by David Wilcock suggesting that the bonds are real, and that this may be part of a huge, hidden manipulation, click here.

Rothschild loses libel case, and reveals secret world of money and politics

Nathaniel Rothschild, scion of the banking dynasty and friend of seemingly everyone in the spheres of finance, business and politics, ... has lost his libel case against the Daily Mail, which he sued for "substantial damages" over its account of his and [Lord] Mandelson's extraordinary trip to Russia in January 2005. Mr Rothschild claimed he was subjected to "sustained and unjustified" attacks in the May 2010 article, which portrayed him as a "puppet master", dangling his friend Lord Mandelson in front of the Russian oligarch Oleg Deripaska to ease the passage of colossal business deals. It began on Mr Rothschild's private jet from the World Economic Forum in Davos to Moscow, where they met Mr Deripaska, the aluminium plant manager who became the richest oligarch of them all, and continued on Mr Deripaska's private jet to his chalet in Siberia. The judge rejected the notion that Mr Rothschild and Mr Mandelson had flown out as friends, not business associates, and said Mr Rothschild's behaviour had in part been "inappropriate". "That conduct foreseeably brought Lord Mandelson's public office and personal integrity into disrepute," the judge said. That leading politicians, bankers and businessmen associate with each other in fashions that blur the boundaries between work and pleasure is a secret too great to be maintained with any success, but it doesn't make the details, on the rare occasions they actually emerge, any more palatable.

Note: For lots more from major media sources on corporate and government corruption, click here and here.

If terrorists ever target Fargo, N.D., the local police will be ready. In recent years, they have bought bomb-detection robots, digital communications equipment and Kevlar helmets, like those used by soldiers in foreign wars. For local siege situations requiring real firepower, police there can use a new $256,643 armored truck, complete with a rotating turret. Until that day, however, the menacing truck is mostly used for training runs and appearances at the annual Fargo picnic, where it’s been displayed near a children’s bounce house. Fargo, like thousands of other communities in every state, has been on a gear-buying spree with the aid of more than $34 billion in federal government grants since the Sept. 11, 2001, terrorist attacks on New York and the Pentagon. The federal grant spending, awarded with little oversight from Washington, has fueled a rapid, broad transformation of police operations in Fargo and in departments across the country. More than ever before, police rely on quasi-military tactics and equipment. A review of records from 41 states obtained through open-government requests, and interviews with more than two-dozen current and former police officials and terrorism experts, shows police departments around the U.S. have transformed into small army-like forces. Many police, including beat cops, now routinely carry assault rifles.

Note: For lots more on the militarization of US police from reliable sources, click here and here.

It's the dark heart of Britain, the place where democracy goes to die, immensely powerful, equally unaccountable. But I doubt that one in 10 British people has any idea of what the Corporation of the City of London is and how it works. As Nicholas Shaxson explains in his fascinating book Treasure Islands, the Corporation exists outside many of the laws and democratic controls which govern the rest of the United Kingdom. The City of London is the only part of Britain over which parliament has no authority. This is ... an official old boys' network. In one respect at least the Corporation acts as the superior body: it imposes on the House of Commons a figure called the remembrancer: an official lobbyist who sits behind the Speaker's chair and ensures that, whatever our elected representatives might think, the City's rights and privileges are protected. The mayor of London's mandate stops at the boundaries of the Square Mile. The City has exploited this remarkable position to establish itself as a kind of offshore state, a secrecy jurisdiction which controls the network of tax havens housed in the UK's crown dependencies and overseas territories. This autonomous state within our borders is in a position to launder the ill-gotten cash of oligarchs, kleptocrats, gangsters and drug barons. It has also made the effective regulation of global finance almost impossible.

Note: To understand how democracy is easily circumvented, read this full article. For lots more from reliable sources on the hidden background to the control over governments held by financial powers, click here.

The secretive Bilderberg Group ... is bringing together the world's financial and political elite this week. Conspiracy theories abound. It's only recently that the media has picked up on the Bilderbergers. Meetings are closed to the public and the media, and no press releases are issued. In the manner of a James Bond plot, up to 150 leading politicians and business people are to gather in a ski resort in Switzerland for four days of discussion about the future of the world. Meetings often feature future political leaders shortly before they become household names. Under the group's leadership of former US Secretary of State Henry Kissinger and one-time EU vice president, Viscount Davignon, the aim is purportedly to allow Western elites to share ideas. But conspiracy theorists have accused it of everything from deliberately engineering the credit crunch to planning to kill 80% of the world population. Denis Healey, co-founder of the group, told the journalist Jon Ronson in his book Them that ... "The confidentiality enabled people to speak honestly without fear of repercussions." Secret cabals extend beyond the Bilderberg Group. The Illuminati ... is alleged to be an all powerful secret society. The Freemasons [is another] secret fraternity society. The conspiracy theorists may get overexcited, but they have a point, says Prof Andrew Kakabadse. The group has genuine power that far outranks the World Economic Forum, which meets in Davos, he argues. And with no transparency, it is easy to see why people are worried about its influence. The theme at Bilderberg is to bolster a consensus around free market Western capitalism and its interests around the globe, he says. "There's a very strong move to have a One World government in the mould of free market Western capitalism."

Note: Why is there so little reporting on this influential group in the major media? Thankfully, the alternative media has had some good articles. And a Google search can be highly informative. For many other revealing news articles from major media sources on powerful secret societies, click here. And for reliable information covering the big picture of how and why these secret societies are using government-sponsored mind control programs to achieve their agenda, click here.

The story of the privatization-obsessed Coalition Provisional Authority [created by Bush in Iraq in 2003] was the centerpiece of Naomi Klein’s best-selling book “The Shock Doctrine,” which argued that it was part of a broader pattern. From Chile in the 1970s onward, she suggested, right-wing ideologues have exploited crises to push through an agenda that has nothing to do with resolving those crises, and everything to do with imposing their vision of a harsher, more unequal, less democratic society. Which brings us to Wisconsin 2011, where the shock doctrine is on full display. In recent weeks, Madison has been the scene of large demonstrations against the governor’s budget bill, which would deny collective-bargaining rights to public-sector workers. Gov. Scott Walker claims that he needs to pass his bill to deal with the state’s fiscal problems. But his attack on unions has nothing to do with the budget. What’s happening in Wisconsin is, instead, a power grab — an attempt to exploit the fiscal crisis to destroy the last major counterweight to the political power of corporations and the wealthy. And the power grab goes beyond union-busting. The bill in question is 144 pages long, and there are some extraordinary things hidden deep inside. For example, the bill includes language that would allow officials appointed by the governor to make sweeping cuts in health coverage for low-income families without having to go through the normal legislative process. The state of Wisconsin owns a number of plants supplying heating, cooling, and electricity to state-run facilities. The language in the budget bill would ... let the governor privatize any or all of these facilities. Not only that, he could sell them, without taking bids, to anyone he chooses. And note that any such sale would, by definition, be “considered to be in the public interest.”

Note: For an abundance of major media articles revealing rampant government corruption, click here.

In December 2003, security forces boarded a bus in Macedonia and snatched a German citizen named Khaled el-Masri. For the next five months, el-Masri was a ghost. Only a select group of CIA officers knew he had been whisked to a secret prison for interrogation in Afghanistan. But he was the wrong guy. In the years since the Sept. 11, 2001, terrorist attacks, officers who committed serious mistakes that left people wrongly imprisoned or even dead have received only minor admonishments or no punishment at all. Many officers who made significant missteps are now the senior managers fighting the president's spy wars. The AP investigation of the CIA's actions revealed a disciplinary system that takes years to make decisions, hands down reprimands inconsistently and is viewed inside the agency as prone to favoritism and manipulation. When people are disciplined, the punishment seems to roll downhill, sparing senior managers even when they were directly involved in operations that go awry. Two officers involved in the death of a prisoner in Afghanistan, for instance, received no discipline and have advanced into Middle East leadership positions. Other officers were punished after participating in a mock execution in Poland and playing a role in the death of a prisoner in Iraq. Those officers retired, then rejoined the intelligence community as contractors. Since 9/11, retired CIA officers have published a variety of books opining on what ails the CIA. Their conclusions differ, but they are in nearly unanimous agreement that the system of accountability is broken.

Note: It is great news that the media is now revealing some of the craziness at the CIA, a topic that was almost taboo for the press in the past.

Top U.S. intelligence officials have raised concerns about the growing vulnerability the United States faces from cyberwarfare threats and malicious computer activity that CIA Director Leon Panetta said "represents the battleground for the future." "The potential for the next Pearl Harbor could very well be a cyber-attack," he testified on Capitol Hill [on February 10] before the House Permanent Select Committee on Intelligence. Panetta provided a stark assessment for the intelligence committee. "If you have a cyber-attack that brings down our power-grid system, brings down our financial system, brings down our government systems, you could paralyze this country," he said. U.S officials from the National Security Agency, Department of Homeland Security and the FBI have actively been working the emerging cybersecurity threats. The military activated U.S. Cyber Command last year to coordinate the military's cyberspace resources.

Note: For more articles from reliable sources on the construction of a total surveillance state, click here.

United States taxpayers have funneled more than $60 billion of aid into Egypt since President Hosni Mubarak came to power in 1981, but more than half of the money has been spent supplying weapons to the country’s military. About $34 billion of the aid to Egypt has come in the form of grants that Congress requires Egypt to spend on American military hardware. In recent years the large amount of aid earmarked for the military, and the relatively low sums supporting civilian aid, have attracted scathing criticism from Egyptians, some of whom argue that US aid has gone to entrench a military dictator at the expense of the fledgling democracy activists. During the early turmoil, protesters were the target of tear gas canisters that read "made in the USA," fueling debate about the aid. Last year, Egypt was the fifth-largest recipient of US aid, getting $1.6 billion. Congress ... authorized major aid packages to both [Egypt and Israel in 1979], using an informal formula — not enshrined in the peace treaty — that gave Egypt $2 for every $3 that Israel received. Israel quickly became the largest recipient of US aid, and Egypt the second-largest — rankings that were only recently overtaken by wars in Afghanistan and Iraq, and last year, the disaster in Haiti. The strong interest of US companies could help explain why US military assistance to Egypt has remained at $1.3 billion a year, while its civilian economic assistance has steadily shrunk, from $815 million a decade ago to $250 million requested for 2011. The decline began in 1998, when Israel arranged for a reduction in economic support and an increase military aid. As Israeli’s economic aid shrunk, so too did Egypt’s.

Note: Israel receives about $3 billion a year from the US, yet the population of the country is 8 million. If you do the math, the US is providing the equivalent of nearly $4,000 in aid per year to every man, woman and child in Israel, with $3,000 of that to buy US military hardware. For lots more reliable information on how the military/industrial complex manipulates world politics to support the war machine, click here and here.

Consumer Watchdog, an advocacy group largely focused in recent years on Google's privacy practices, has called [for] a congressional investigation into the Internet giant's "cozy" relationship with U.S. President Barack Obama's administration. In a letter sent [on January 24], Consumer Watchdog asked Representative Darrell Issa, the new chairman of the House Oversight and Government Reform Committee, to investigate the relationship between Google and several government agencies. "We believe Google has inappropriately benefited from close ties to the administration," the letter said. "It should not get special treatment and access because of a special relationship with the administration." Consumer Watchdog's latest complaints about the relationship of Google and the Obama administration are outlined in a 32-page report [which] questions Google's relationship with the U.S. National Security Agency and calls for the company to be more open about what consumer information it shares with the spy agency.

Nine years after the terrorist attacks of 2001, the United States is assembling a vast domestic intelligence apparatus to collect information about Americans, using the FBI, local police, state homeland security offices and military criminal investigators. The system, by far the largest and most technologically sophisticated in the nation's history, collects, stores and analyzes information about thousands of U.S. citizens and residents, many of whom have not been accused of any wrongdoing. The months-long investigation [by The Washington Post], based on nearly 100 interviews and 1,000 documents, found that: * Technologies and techniques honed for use on the battlefields of Iraq and Afghanistan have migrated into the hands of law enforcement agencies in America. * The FBI is building a database with the names and certain personal information, such as employment history, of thousands of U.S. citizens and residents whom a local police officer or a fellow citizen believed to be acting suspiciously. * Law enforcement agencies have hired as trainers self-described experts whose extremist views on Islam and terrorism are considered inaccurate and counterproductive by the FBI and U.S. intelligence agencies. * The Department of Homeland Security sends its state and local partners intelligence reports with little meaningful guidance, and state reports have sometimes inappropriately reported on lawful meetings.

Note: This report is part of a series, "Top Secret America," by The Washington Post. For more, click here.

On the third Wednesday of every month, the nine members of an elite Wall Street society gather in Midtown Manhattan. The men share a common goal: to protect the interests of big banks in the vast market for derivatives, one of the most profitable — and controversial — fields in finance. They also share a common secret: The details of their meetings, even their identities, have been strictly confidential. Drawn from giants like JPMorgan Chase, Goldman Sachs and Morgan Stanley, the bankers form a powerful committee that helps oversee trading in derivatives, instruments which, like insurance, are used to hedge risk. In theory, this group exists to safeguard the integrity of the multitrillion-dollar market. In practice, it also defends the dominance of the big banks. The banks in this group ... have fought to block other banks from entering the market, and they are also trying to thwart efforts to make full information on prices and fees freely available. Banks’ influence over this market, and over clearinghouses like the one this select group advises, has costly implications for businesses large and small. The size and reach of this market has grown rapidly over the past two decades. Pension funds today use derivatives to hedge investments. States and cities use them to try to hold down borrowing costs. Airlines use them to secure steady fuel prices. Food companies use them to lock in prices of commodities like wheat or beef.

Note: To explore highly revealing news articles on the powerful secret societies which without doubt back these top bankers, click here. For a treasure trove of reports from reliable sources detailing the amazing control of major banks over government and society, click here.

Every email, phone call and website visit is to be recorded and stored after the Coalition Government revived controversial Big Brother snooping plans. It will allow security services and the police to spy on the activities of every Briton who uses a phone or the internet. Moves to make every communications provider store details for at least a year will be unveiled later this year sparking fresh fears over a return of the surveillance state. It comes despite the Coalition Agreement promised to "end the storage of internet and email records without good reason". The plans are expected to involve service providers storing all users details for a set period of time. That will allow the security and police authorities to track every phone call, email, text message and website visit made by the public if they argue it is needed to tackle crime or terrorism. The information will include who is contacting whom, when and where and which websites are visited, but not the content of the conversations or messages. The move was buried in the Government's Strategic Defence and Security Review.

Note: For lots more from major media sources on increasing government and corporate threats to privacy, click here.

Yasir Afifi, a 20-year-old computer salesman and community-college student, took his car in for an oil change earlier this month and his mechanic spotted an odd wire hanging from the undercarriage. The wire was attached to a strange magnetic device that puzzled Afifi and the mechanic. They freed it from the car and posted images of it online, asking for help in identifying it. Two days later, FBI agents arrived at Afifi's Santa Clara apartment and demanded the return of their property — a global-positioning-system tracking device now at the center of a raging legal debate over privacy rights. One federal judge wrote that the widespread use of the device was straight out of George Orwell's novel Nineteen Eighty-Four." By holding that this kind of surveillance doesn't impair an individual's reasonable expectation of privacy, the panel hands the government the power to track the movements of every one of us, every day of our lives," wrote Alex Kozinski, the chief judge of the 9th U.S. Circuit Court of Appeals, in a blistering dissent in which a three-judge panel from his court ruled that search warrants weren't necessary for GPS tracking. In his dissent, Chief Judge Kozinski noted that GPS technology is far different from tailing a suspect on a public road, which requires the active participation of investigators. "The devices create a permanent electronic record that can be compared, contrasted and coordinated to deduce all manner of private information about individuals," Kozinksi wrote.

Federal law enforcement and national security officials are preparing to seek sweeping new regulations for the Internet, arguing that their ability to wiretap criminal and terrorism suspects is “going dark” as people increasingly communicate online instead of by telephone. Essentially, officials want Congress to require all services that enable communications — including encrypted e-mail transmitters like BlackBerry, social networking Web sites like Facebook and software that allows direct “peer to peer” messaging like Skype — to be technically capable of complying if served with a wiretap order. The mandate would include being able to intercept and unscramble encrypted messages. James X. Dempsey, vice president of the Center for Democracy and Technology, an Internet policy group, said the proposal had “huge implications” and challenged “fundamental elements of the Internet revolution” — including its decentralized design. “They are really asking for the authority to redesign services that take advantage of the unique, and now pervasive, architecture of the Internet,” he said. “They basically want to turn back the clock and make Internet services function the way that the telephone system used to function.”

Note: For an analysis of this new government move to spy on US citizens, click here. For lots more from reliable sources on disturbing government threats to privacy and civil liberties, click here and here.

The U.S. government will have unmanned surveillance aircraft monitoring the whole southwest border with Mexico from September 1, as it ramps up border security in this election year. Homeland Security Secretary Janet Napolitano said U.S. Customs and Border Protection would begin flying a Predator B drone out of Corpus Christi, Texas, on [that date], extending the reach of the agency's unmanned surveillance aircraft across the length of the nearly 2,000 mile border with Mexico. "With the deployment of the Predator in Texas, we will now be able to cover the southwest border from the El Centro sector in California all the way to the Gulf of Mexico in Texas, providing critical aerial surveillance assistance to personnel on the ground," Napolitano said during a conference call. Earlier this month, President Barack Obama signed a $600 million bill that would fund some 1,500 new Border Patrol agents, customs inspectors and other law enforcement officials along the border, as well as paying for two more unmanned drones. The Predator B drones are made by defense contractor General Atomics. They carry equipment including sophisticated day and night vision cameras that operators use to detect drug and human smugglers, and can stay aloft for up to 30 hours at a time.

Note: How long will it be before aerial surveillance drones, now positioned over the southern border of the US, are deployed in other parts of the country?

Mexico's sixth-largest city, Leon, is on the road to ... a future in which everyone is tracked wherever they go. Fast Company reports that U.S. biometrics firm Global Rainmakers and its Mexican partner announced yesterday that they have begun installing iris-scanning technology in the city of more than 1 million in Guanajuato state. The companies aim ... to create "the most secure city in the world." The first phase concentrates on law enforcement and security checkpoints. Then the iris scanners, which the firms say can "identify humans in motion and at a distance while ensuring liveness," will fill malls, pharmacies, mass transit, medical centers and banks, "among other public and private locations," Fast Company writes. "In the future, whether it's entering your home, opening your car, entering your workspace, getting a pharmacy prescription refilled, or having your medical records pulled up, everything will come off that unique key that is your iris," says Jeff Carter, CDO of Global Rainmakers. Before coming to GRI, Carter headed a think tank partnership between Bank of America, Harvard, and MIT. "Every person, place, and thing on this planet will be connected [to the iris system] within the next 10 years," he says.

Note: For lots more from reliable sources on threats to privacy, click here.

[An] IMF paper [that] first came out in April, 2010, [a]uthored by Reza Moghadam, director of the IMF’s strategy, policy and review department, ... discusses how the IMF sees the International Monetary System evolving after the financial crisis. In the eyes of the IMF ... the best way to ensure the stability of the international monetary system (post crisis) is actually by launching a global currency. And that, the IMF says, is largely because [sovereign nations] cannot be trusted to redistribute surplus reserves, or battle their deficits, themselves. The ongoing buildup of such imbalances, meanwhile, only makes the system increasingly vulnerable to shocks. It’s also a process that’s ultimately unsustainable for all, says the IMF. All in all, the IMF believes there has simply been too much reserve hoarding going on. A global currency makes the most sense, the paper concludes — especially since the SDR [Special Drawing Rights] is currently just an accounting tool that draws on the freely usable currencies of member states, not an actual currency itself.

Note: For key news articles on the global financial crisis to which this IMF report is responding, click here.

With no warning one weekday morning, investigators entered an organic grocery with a search warrant and ordered the hemp-clad workers to put down their buckets of mashed coconut cream and to step away from the nuts. Then, guns drawn, four officers fanned out across Rawesome Foods in Venice. Skirting past the arugula and peering under crates of zucchini, they found the raid's target inside a walk-in refrigerator: unmarked jugs of raw milk. Cartons of raw goat and cow milk and blocks of unpasteurized goat cheese were among the groceries seized in the June 30 raid by federal, state and local authorities — the latest salvo in the heated food fight over what people can put in their mouths. On one side are government regulators, who say they are enforcing rules designed to protect consumers from unsafe foods and to provide a level playing field for producers. On the other side are " healthy food" consumers [who] seek food in its most pure form. "This is about control and profit, not our health," said Aajonus Vonderplanitz, co-founder of Rawesome Foods. "How can we not have the freedom to choose what we eat?" Demand for all manner of raw foods — including honey, nuts and meat — has been growing, spurred by heightened interest in the way food is produced. But raw milk in particular has drawn a lot of regulatory scrutiny, largely because the politically powerful dairy industry has pressed the government to act.

Note: For lots more on government corruption from reliable sources, click here.

America locks up too many people, some for acts that should not even be criminal

America is different from the rest of the world in lots of ways, many of them good. One of the bad ones is its willingness to lock up its citizens. One American adult in 100 festers behind bars (with the rate rising to one in nine for young black men). Its imprisoned population, at 2.3m, exceeds that of 15 of its states. No other rich country is nearly as punitive as the Land of the Free. The rate of incarceration is a fifth of America’s level in Britain, a ninth in Germany and a twelfth in Japan. America’s incarceration rate has quadrupled since 1970. Similar things have happened elsewhere. The incarceration rate in Britain has more than doubled, and that in Japan increased by half, over the period. But the trend has been sharper in America than in most of the rich world, and the disparity has grown. It is explained neither by a difference in criminality (the English are slightly more criminal than Americans, though less murderous), nor by the success of the policy: America’s violent-crime rate is higher than it was 40 years ago. Many states have mandatory minimum sentences, which remove judges’ discretion to show mercy, even when the circumstances of a case cry out for it. “Three strikes” laws, which were at first used to put away persistently violent criminals for life, have in several states been applied to lesser offenders.

Note: For a recent report on the size of the US prison population in comparison with other countries, click here.

The federal government is launching an expansive program dubbed "Perfect Citizen" to detect cyber assaults on private companies and government agencies running such critical infrastructure as the electricity grid and nuclear-power plants. The surveillance by the National Security Agency, the government's chief eavesdropping agency, would rely on a set of sensors deployed in computer networks for critical infrastructure that would be triggered by unusual activity suggesting an impending cyber attack. Defense contractor Raytheon Corp. recently won a classified contract for the initial phase of the surveillance effort valued at up to $100 million. Some industry and government officials familiar with the program see Perfect Citizen as an intrusion by the NSA into domestic affairs. One internal Raytheon email, the text of which was seen by The Wall Street Journal [said,] "Perfect Citizen is Big Brother." Raytheon declined to comment on this email. The information gathered by Perfect Citizen could also have applications beyond the critical infrastructure sector, officials said, serving as a data bank that would also help companies and agencies who call upon NSA for help with investigations of cyber attacks, as Google did when it sustained a major attack late last year.

Note: For key reports of government and corporate surveillance from reliable sources, click here.

WikiLeaks co-founder Julian Assange has given his strongest indication yet about the next big leak from his whistleblower organisation. In an interview with the ABC's Foreign Correspondent, Mr Assange said cryptically of WikiLeaks' current project: "I can give an analogy. If there had been mass spying that had affected many, many people and organisations and the details of that mass spying were released then that is something that would reveal that the interests of many people had been abused." He agreed it would be of the "calibre" of publishing information about the way the top secret Echelon system - the US-UK electronic spying network which eavesdrops on worldwide communications traffic - had been used. Mr Assange also confirmed that WikiLeaks has a copy of a video showing a US military bombing of a western Afghan township which killed dozens of people, including children. During the course of the past month, Mr Assange has been talking to [ABC's] Foreign Correspondent for [an upcoming] program examining the efficacy of the WikiLeaks model. "What we want to create is a system where there is guaranteed free press across the world, the entire world, that every individual in the world has the ability to publish materials that is meaningful," he said.

Note: For more on government surveillance from major media sources, click here.

Israel was tonight under pressure to allow an independent inquiry into its assault on the Gaza aid flotilla after autopsy results on the bodies of those killed, obtained by the Guardian, revealed they were peppered with 9mm bullets, many fired at close range.
Nine Turkish men on board the Mavi Marmara were shot a total of 30 times and five were killed by gunshot wounds to the head, according to the vice-chairman of the Turkish council of forensic medicine, [Yalcin Buyuk]. The results revealed that a 60-year-old man, Ibrahim Bilgen, was shot four times in the temple, chest, hip and back. A 19-year-old, named as Fulkan Dogan, who also has US citizenship, was shot five times from less that 45cm, in the face, in the back of the head, twice in the leg and once in the back. Two other men were shot four times, and five of the victims were shot either in the back of the head or in the back. The new information about the manner and intensity of the killings undermines Israel's insistence that its soldiers opened fire only in self defence and in response to attacks by the activists. "Given the very disturbing evidence which contradicts the line from the Israeli media and suggests that Israelis have been very selective in the way they have addressed this, there is now an overwhelming need for an international inquiry," said Andrew Slaughter MP, a member of the all party group on Britain and Palestine.

Organizations in the financial services sector have deployed at least 1,447 former federal employees to lobby Congress and federal agencies since the beginning of 2009, according to a joint analysis of federal disclosure records and other data released today by Public Citizen and the Center for Responsive Politics. This small army of registered financial services sector lobbyists includes at least 73 former members of Congress, of whom 17 served on the banking committees of either the U.S. House of Representatives or the Senate. At least 66 industry lobbyists worked for these committees as staffers, while 82 additional lobbyists once worked for congressional members who currently serve on these key committees. Further, at least 42 financial services lobbyists formerly served in some capacity in the U.S. Treasury Department. At least seven served in the Office of the Comptroller of the Currency, including two former comptrollers. “Wall Street hires former members of Congress and their staff for a reason," said David Arkush, director of Public Citizen’s Congress Watch division. "These people are influential because they have personal relationships with current members and staff. It’s hard to say no to your friends."

Note: To read the full report, click here. The nonprofit, nonpartisan Center for Responsive Politics is the nation's premier research group tracking money in federal politics and its effect on elections and public policy. Public Citizen is a national, nonprofit consumer advocacy organization based in Washington, D.C.

Germany is fighting to keep sealed the Adolf Eichmann files detailing the years the Holocaust chief logistical organiser spent on the run before he was captured by Mossad agents. Those hoping to have a 50-year secrecy order overturned believe the government is embarrassed by details within that may prove German and Vatican officials colluded in his escape and freedom. For the current papacy under the German pope, Benedict XVI, the 4,500 page Eichmann dossier could be the ’smoking gun’ that would shoot down his plans to canonize Pope Pius XII (1939-58), aka ‘Hitler’s Pope.’ The role of Pope Pius XII during World War II, his relationship with Nazism and his efforts (or lack of them) to save Jews from the gas chambers are hotly disputed. Even within the Jewish community there are strong opinions on both sides of the debate. In fact history’s most savage mass murderers – Adolf Eichmann, Dr Josef Mengele, better known as Auschwitz’s ‘Angel of Death’, Franz Stangl, commandant of the Treblinka extermination camp – escaped justice down the ‘ratline’ that ran straight through the Vatican state in Rome.Senior members of the Roman Catholic hierarchy – marinaded in virulent Judeophobia and obsessed by Bolshevism – organised the escape of thousands of the most debauched, cruel monsters to a peaceful, prosperous retirement in Catholic South America.

Note: As mentioned by the initiator of the lawsuit to open the documents in this Associated Press story, "I think it's impossible that in Germany we are hiding documents about a convicted Nazi mass murderer today." Evidence suggests that these Nazis were purposely allowed to escape with the involvement of the Vatican, the CIA, and other groups. Josef Mengele is purported to have gone on to train the CIA in powerful mind control techniques he perfected using concentration camp inmates as guinea pigs. For more on this, click here.

On top of everything Lehman Brothers did before it collapsed in 2008, nearly toppling the financial system, it now seems that it was aggressively massaging its books. A new report on the Lehman collapse, released last week ... would leave anyone dumbstruck by the firm’s audacity — and reminded of the crying need for adult supervision of Wall Street. The 2,200-page report [finds that] Lehman engaged in transactions that let it temporarily shift troubled assets off its books and in so doing, hide its reliance on borrowed money. The maneuvers ... made the firm appear healthier than it was. [The author, Anton R. Valukas, a former federal prosecutor,] wrote that Richard S. Fuld Jr., Lehman’s former chief executive, was “at least grossly negligent,” and that Lehman executives engaged in “actionable balance sheet manipulation.” According to the report, rating agencies, government regulators and Lehman’s board of directors had no clue about the gimmicks. The result is that we were all blindsided. And we could be blindsided again. Congress is not even close to passing meaningful regulatory reform. The surviving banks have only gotten bigger and more politically powerful. If the Valukas report is not a wake-up call, what would be?

Note: The Lehman report is described in detail here. For revealing information showing how the US Treasury Department continues to fight against a much-needed audit of the Federal Reserve, click here. For a great collection of revealing reports from reliable sources on the hidden realities behind the financial crisis and government bailouts of the biggest financial corporations, click here.

In a remote mountainside on the Norwegian tundra sits the "doomsday vault," a backup against disaster -- manmade or otherwise. Inside lives the last hope should the unthinkable occur: a global seedbank that could be used to replant the world. It's a modern day Noah's Ark, in other words, full not of animals but of plantlife. The Svalbard "doomsday" Global Seed Vault [stores] a half-million seed varieties. The arctic permafrost offers natural freezing for the seeds, while additional cooling brings the temperatures down to minus 0.4 degrees Fahrenheit. Should disaster wipe out a species -- or in the case of a large-scale global crisis -- its stockers hope the seeds stored there could be used to restore life. The preciousness of the seeds there is also reflected in the inaccessible nature of the vault. Anyone seeking access to the seeds themselves will have to pass through four locked doors: the heavy steel entrance doors, a second door approximately 115 meters down the tunnel and finally the two keyed air-locked doors. Keys are coded to allow access to different levels of the facility. Not all keys unlock all doors.

Note: Should a major disaster or armageddon happen, the designers of this vault assume that the keyholders will survive. Why such a high level of security when this is by no means certain?

[Here's a story] from Ellsberg's book Secrets. The setting is a meeting with Henry Kissinger in late 1968. In 1968 Ellsberg was a highly respected analyst ... who had worked for both the Pentagon and Rand, and Kissinger was just entering the government. Ellsberg told him, "Henry, there's something I would like to tell you. You've dealt a great deal with top secret information. But you're about to receive a whole slew of special clearances, maybe fifteen or twenty of them, that are higher than top secret. First, you'll be exhilarated by some of this new information. But second, ... you will feel like a fool for having studied, written, talked about these subjects, criticized and analyzed decisions made by presidents for years without having known of the existence of all this information. In particular, you'll feel foolish for having literally rubbed shoulders for over a decade with some officials and consultants who did have access to all this ... and you'll be stunned that they kept that secret from you so well. You will feel like a fool. Then, after you've ... become used to using what amounts to whole libraries of hidden information, ... you will forget there ever was a time when you didn't have it. You'll be aware only of the fact that you have it now and most others don't ... and that all those other people are fools. [In] a matter of two or three years — you'll eventually become aware of the limitations of this information. It's often inaccurate, and it can lead you astray. But that takes a while to learn. In the meantime ... you will deal with a person who doesn't have those clearances only from the point of view of what you want him to believe and what impression you want him to go away with. You'll have to lie carefully to him about what you know. In effect, you will have to manipulate him.

Note: Don't miss the entire fascinating, highly revealing article at the link above. To see this quote from Ellsberg's book on Google books, click here. For more on government secrets, see the deeply revealing reports from reliable major media sources available here.

Dominique Strauss-Kahn, the head of the International Monetary Fund, suggested [that] the organization might one day be called on to provide countries with a global reserve currency that would serve as an alternative to the U.S. dollar. "That day has not yet come, but I think it is intellectually healthy to explore these kinds of ideas now," he said in a speech on the future mandate of the 186-nation Washington-based lending organization. Strauss-Kahn said such an asset could be similar to but distinctly different from the IMF's special drawing rights, or SDRs, the accounting unit that countries use to hold funds within the IMF. It is based on a basket of major currencies. He said having other alternatives to the dollar "would limit the extent to which the international monetary system as a whole depends on the policies and conditions of a single, albeit dominant, country." Several countries, including China and Russia, have called for an alternative to the dollar as a reserve currency.

Note: For a treasure trove of reports from reliable sources on the hidden realities behind the world financial and economic crisis, click here.

It's time to reflect on the immense powers Americans have ceded to the government and [the] potential for abuse by federal, state and local authorities. The global Internet and telecommunications infrastructure provides massive information on almost ... every person on the planet. One power truly stands out --- the all-encompassing reach and technological capabilities of the US National Security Agency. If you want to be secure, don't use a phone, a computer, credit card or any other technologically linked system because it guarantees that Big Brother will find you. Big Brother is not just the government. Most consumer "spying" comes from subpoenas and requests from non-terrorist-related federal, state, local agency requests and non-governmental private litigation and discovery. Simply put, a subpoena issued by a court in support of private litigation and discovery may have the same impact on an individual as the full force of the NSA. What information is typically requested from a company by say a plaintiff's lawyer during some discovery phase? Well, it's everything. In fact, it's generally a fishing expedition for every log file, every uploaded video, photo, chat session and anything else they can get their hands on.

Note: For lots more from major media sources on the continuing development of a global society under Big Brother's constant gaze, click here.

Embroiled in its debt crisis and looking for any avenue to bolster tax receipts [Greece] has done the unthinkable – it has made [cash, in euros] illegal for transactions over 1,500 euros. Of course, larger credit- or debit-based electronic transactions over 1,500 will still be denominated in euros. However, electronic transactions clearly require infrastructure and limit personal freedom. From Reuters: “From 1. Jan. 2011, every transaction above 1,500 euros between natural persons and businesses, or between businesses, will not be considered legal if it is done in cash. Transactions will have to be done through debit or credit cards.” It seems wrong for the Greek state to dictate how cash euros can be used. In fact, it’s surprising that the EU-endorsed plan would allow Greece to control euro usage at that level. Despite the fact that the reform bill is a piece of an approved EU plan to help improve Greek tax revenue and reduce deficit, it seems to go too far in curtailing personal liberty. How much is a government willing to punish its own citizens for using “too much” of their own legal tender in an otherwise legal transaction?

Note: What gives any government the right to limit cash transactions? And why is the EU approving this unusual measure? Could this be part of a hidden agenda to push the public towards a cashless society?

Mark Pittman, an investigative reporter for Bloomberg News ... filed a Freedom of Information Act request with the Federal Reserve Board, seeking the details of its unprecedented efforts to funnel money to the collapsing banks of Wall Street. That was in September 2008. Just more than a year later, Mr. Pittman ... died unexpectedly at age 52. But his cause has persevered. It is now known as Bloomberg L.P. v. Board of Governors of the Federal Reserve, an attempt to unlock the vault of the largest Wall Street rescue plan in decades — or, as the legal briefs put it, to “break down a wall of secrecy” that the Fed has kept in place for nearly two years in its “controversial use of public money to prop up financial institutions.” The Federal Reserve has wrapped itself in secrecy since the turn of the 20th century, when a select group of financiers met at the private Jekyll Island Club off the eastern coast of Georgia and, forgoing last names to preserve their anonymity among the staff, drafted legislation to create a central bank. Its secrecy, of course, persists today, with Ben S. Bernanke, the Federal Reserve chairman, refusing to tell even Congress which banks received government money under the bailout. There is also a heated battle to force the Fed to disclose its role in the controversial attempt to save the insurance giant American International Group.

Note: Isn't it interesting that Pittman died at age 52 while trying to expose manipulations of the big bankers? For a one-minute video proving the existence of a secret weapon which can cause an undetectable heart attack, click here. For a concise, excellent background on the hidden role of the Federal Reserve, click here.

Just before Christmas, the US President, Barack Obama, signed into law one of his country's biggest aid pledges of the year. It was bound not for Africa or any of the many struggling countries on the World Bank's list. It was a deal for $US2.77 billion ($3 billion) to go to Israel in 2010 and a total of $US30 billion over the next decade. Israel is bound by the agreement to use 75 per cent of the aid to buy military hardware made in the US. For the first time the US is also providing $US500 million to the Palestinian Authority, including $US100 million to train security forces, under the strict proviso that the authority's leadership recognises Israel. For many years Israel has been the largest recipient of US foreign aid, followed by Egypt ($US1.75 billion), which also receives most of its assistance in tied military aid. The Congressional Research Service says that the US spent 17 per cent of its total aid budget - or $US5.1 billion - on military aid in 2008, of which $US4.7 billion was grants to enable governments to receive equipment from the US.

Note: Israel's population is 7.5 million. If you do the math, the US is providing the equivalent of $4,000 in aid to every man, woman and child in Israel over the next decade, with $3,000 of that to buy US military hardware. For lots more on government-facilitated profiteering in the arms industry, click here and here.

Drugs money worth billions of dollars kept the financial system afloat at the height of the global crisis, the United Nations' drugs and crime tsar has told the Observer.
Antonio Maria Costa, head of the UN Office on Drugs and Crime, said he has seen evidence that the proceeds of organised crime were "the only liquid investment capital" available to some banks on the brink of collapse last year. He said that a majority of the $352bn (Ł216bn) of drugs profits was absorbed into the economic system as a result. This will raise questions about crime's influence on the economic system at times of crisis. It will also prompt further examination of the banking sector as world leaders, including Barack Obama and Gordon Brown, call for new International Monetary Fund regulations. Speaking from his office in Vienna, Costa said evidence that illegal money was being absorbed into the financial system was first drawn to his attention by intelligence agencies and prosecutors around 18 months ago. "In many instances, the money from drugs was the only liquid investment capital. In the second half of 2008, liquidity was the banking system's main problem and hence liquid capital became an important factor," he said. Some of the evidence put before his office indicated that gang money was used to save some banks from collapse when lending seized up, he said. "Inter-bank loans were funded by money that originated from the drugs trade and other illegal activities... There were signs that some banks were rescued that way."

Note: For many revealing reports from major media sources on the hidden realities behind the global financial crisis, click here.

If you want to encourage the kind of conspiracy theories that have prospered in the wake of last year’s financial crisis — those that describe a secret cabal of elites running the world — try doing the following: Have a group of 30 high-powered economists, government officials and bankers meet under the auspices of an international group that shares ideas on how to run the global financial architecture. Have your Board of Trustees led by an influential former Federal Reserve chairman who’s now working as a senior advisor to the president of the United States. Name the former vice chairman of bailout behemoth AIG as the group’s Chairman and CEO (It helps that he [is] former governor of the Bank of Israel). Ensure that membership includes the likes of these: A former Treasury Secretary and president of Harvard who also now works as a top presidential economic advisor; Citigroup’s senior vice chairman; a former IMF deputy managing director and the current governor of the Bank of Israel; and top representatives of the world’s four most important central banks. Hold two days of closed-door meetings at the New York Fed. Do not publicize a list of attendees and leave everyone guessing about the agenda. These were the circumstances surrounding Friday’s start to the 62nd plenary meetings of the Group of 30, whose formal name is “The Consultative Group on International Economic and Monetary Affairs, Inc.”

Note: The article interestingly then goes on to claim that this secret meeting of the world's top bankers is not really anything to worry about, that they are really working for the public good. If so, why not have the meeting open and widely covered by the press? For many other revealing articles from major media reports on secret societies and secret meetings of the most rich and powerful people in our world, click here.

Jesse Ventura is back for another stab at TV stardom, this time hosting a program that digs into conspiracy theories, including alternate views of what was behind the attacks of Sept. 11, 2001, and the purpose of a sprawling research center in remote Alaska.
The former Minnesota governor, professional wrestler and Navy SEAL stars in "Conspiracy Theory With Jesse Ventura," ... on truTV. The cable network, part of Turner Broadcasting System Inc., has ordered seven episodes of the hourlong weekly series. Marc Juris, executive vide president and general manager of truTV, said Ventura is passionate about the show and brings "knowledge from the inside" of government. "He's not doing this as an act or a gimmick. It's true to his heart. He's really looking for the answers," Juris told the AP. The premiere episode deals with the High Frequency Active Auroral Research Program, or HAARP, a 35-acre compound of 180 antennas near Gakona, Alaska, that is used to study the Earth's ionosphere. Ventura and those he interviews question whether the government is using the site to manipulate the weather or to bombard people with mind-controlling radio waves. Future "Conspiracy Theory" shows explore alleged cover-ups surrounding the Sept. 11 attacks and whether there are real "Manchurian Candidate" assassins who are programmed to kill, said Juris.

Note: Ventura was also a Navy Seal, where he personally was involved in top secret activities and learned how what is presented to the public is very different from the deeper realities. Don't miss the highly educational episode on the vitally important topic of HAARP by clicking here. And watch the excellent episode on 9/11 by clicking here. You'll be surprised by the new angles presented.

What really happens behind the padlocked doors of this windowless building, [the home] of Skull and Bones, Yale's oldest secret society? Its members include some of America's most powerful and privileged elite all sworn to secrecy. [CAMPBELL] BROWN: Alexandra Robbins broke through the wall of silence to write Secrets of the Tomb based on clandestine interviews with dozens of bonesmen. Only 15 [Yale students] get picked each year. The society includes at least three U.S. presidents, Supreme Court justices, and too many senators and CEOs to name. In 2004, Bush versus Kerry was the first all-bonesmen presidential election. ALEXANDRA ROBBINS: Skull and Bones' only purpose is to get its members into positions of prominence around the world so that they can elevate other members to similar positions. One of the first activities they participate in is called connubial bliss, where ... each member must spend an evening standing in front of the other 14 bonesmen and recount his or her entire sexual and romantic history. BROWN: According to one ... story, Prescott Bush, George W. Bush's grandfather, was part of a group that broke into the Oklahoma burial place of the Apache chief Geronimo and made off with his skull. Geronimo's grave was disturbed back in 1918, there are photos of skulls inside the "Skull and Bones" tomb. They have their own private retreat. Deer Island off the coast of New York. And a world of ready investors and political contacts in the highest echelons of American society. What has kept the secret society alive for all these years? Good old fashioned networking for the super elite.

Note: To watch the CNN video clip on this Yale secret society, click here. For lots more powerful information on Skull and Bones and other secret societies reported in major media articles, click here.

Every phone call, text message, email and website visit made by private citizens is to be stored for a year and will be available for monitoring by government bodies. All telecoms companies and internet service providers will be required by law to keep a record of every customerâ€™s personal communications, showing who they have contacted, when and where, as well as the websites they have visited. Despite widespread opposition to the increasing amount of surveillance in Britain, 653 public bodies will be given access to the information, including police, local councils, the Financial Services Authority, the ambulance service, fire authorities and even prison governors. They will not require the permission of a judge or a magistrate to obtain the information, but simply the authorisation of a senior police officer or the equivalent of a deputy head of department at a local authority. The Government announced yesterday it was pressing ahead with privately held â€śBig Brotherâ€ť databases that opposition leaders said amounted to â€śstate-spyingâ€ť and a form of â€ścovert surveillanceâ€ť on the public. It is doing so despite its own consultation showing that it has little public support. The new rules ... will not only force communications companies to keep their records for longer, but to expand the type of data they keep to include details of every website their customers visit.

Note: For many more reports from major media sources on the disturbing trend toward increasing government and corporate surveillance and loss of privacy, click here.

On a remote edge of Utah's dry and arid high desert ... hard-hatted construction workers with top-secret clearances are preparing to build [a] mammoth $2 billion structure. It's being built by the ultra-secret National Security Agency ... to house trillions of phone calls, e-mail messages, and [electronic data trails of all kinds]. The NSA is also completing work on another data archive, this one in San Antonio, Texas, which will be nearly the size of the Alamodome. Just how much information will be stored in these windowless cybertemples? A recent report prepared by the MITRE Corporation, a Pentagon think tank, [states] "Sensor data volume could potentially increase to the level of Yottabytes [10-to-the-24th-power bytes] by 2015." Once vacuumed up and stored in these near-infinite "libraries," the data are then analyzed by powerful infoweapons, supercomputers running complex algorithmic programs, to determine who among us may be — or may one day become — a terrorist. Emerging [after 9/11] as the most powerful chief the spy world has ever known was the director of the NSA. He is in charge of an organization three times the size of the CIA and empowered in 2008 by Congress to spy on Americans to an unprecedented degree. These new centers in Utah, Texas, and possibly elsewhere will likely become the centralized repositories for the data intercepted by the NSA in America's version of the "big brother database."

Note: James Bamford, the author of this review of a new book on the history of the NSA, has himself written three important books on the agency. For many revealing reports from reliable sources on the developing capacity by government and corporate surveillance to construct a "Big Brother" states, click here.

In 2006 and 2007, Goldman Sachs Group peddled more than $40 billion in securities backed by at least 200,000 risky home mortgages, but never told the buyers it was secretly betting that a sharp drop in U.S. housing prices would send the value of those securities plummeting. Goldman's sales and its clandestine wagers, completed at the brink of the housing market meltdown, enabled one of the nation's premier investment banks to pass most of its potential losses to others before a flood of mortgage loan defaults staggered the U.S. and global economies. Only later did investors discover that what Goldman promoted as triple-A investments were closer to junk. Now, pension funds, insurance companies, labor unions and foreign financial institutions that bought those dicey mortgage securities are facing large losses, and a five-month McClatchy Newspapers investigation has found that Goldman's failure to disclose that it made secret, exotic bets on an imminent housing crash may have violated securities laws. "The Securities and Exchange Commission should be very interested in any financial company that secretly decides a financial product is a loser and then goes out and actively markets that product or very similar products to unsuspecting customers without disclosing its true opinion," said Laurence Kotlikoff, a Boston University economics professor who's proposed a massive overhaul of the nation's big banks. "This is fraud and should be prosecuted."

Note: For an eye-opening, powerful PBS video which reveals how the economic crisis was conscously allowed to happen, click here. It reveals that Fed chairman Alan Greenspan was against investigating any fraud. For many reports from reliable sources on corruption at the core of the Wall Street collapse and bailout, click here.

After a Somali-American teenager from Minneapolis committed a suicide bombing in Africa in October 2008, the Federal Bureau of Investigation began investigating whether a Somali Islamist group had recruited him on United States soil. Instead of collecting information only on people about whom they had a tip or links to the teenager, agents fanned out to scrutinize Somali communities. The operation unfolded as the Bush administration was relaxing some domestic intelligence-gathering rules. The F.B.I.’s interpretation of those rules was recently made public when it released, in response to a Freedom of Information lawsuit, its “Domestic Investigations and Operations Guide.” The disclosure of the manual has opened the widest window yet onto how agents have been given greater power in the post-Sept. 11 era. But the manual’s details have alarmed privacy advocates. “It raises fundamental questions about whether a domestic intelligence agency can protect civil liberties if they feel they have a right to collect broad personal information about people they don’t even suspect of wrongdoing,” said Mike German, a former F.B.I. agent who now works for the American Civil Liberties Union.
The manual authorizes agents to open an “assessment” to “proactively” seek information about whether people or organizations are involved in national security threats. Assessments permit agents to use potentially intrusive techniques, like sending confidential informants to infiltrate organizations and following and photographing targets in public. When selecting targets, agents are permitted to consider political speech or religion as one criterion.

Note: To read the FBI's recently-released and redacted new "Domestic Investigations and Operation Guide", described by the New York Times as giving "F.B.I. agents the most power in national security matters that they have had since the post-Watergate era," click here.

Police are gathering the personal details of thousands of activists who attend political meetings and protests, and storing their data on a network of nationwide intelligence databases. The hidden apparatus has been constructed to monitor "domestic extremists". Detailed information about the political activities of campaigners is being stored on a number of overlapping IT systems, even if they have not committed a crime. Senior officers say domestic extremism, a term coined by police that has no legal basis, can include activists suspected of minor public order offences such as peaceful direct action and civil disobedience. Three national police units responsible for combating domestic extremism are run by the "terrorism and allied matters" committee of the Association of Chief Police Officers (Acpo). In total, it receives Ł9m in public funding, from police forces and the Home Office, and employs a staff of 100. The main unit, the National Public Order Intelligence Unit (NPOIU), runs a central database which lists thousands of so-called domestic extremists. It filters intelligence supplied by police forces across England and Wales, which routinely deploy surveillance teams at protests, rallies and public meetings. Vehicles associated with protesters are being tracked via a nationwide system of automatic number plate recognition (ANPR) cameras. Police surveillance units, known as Forward Intelligence Teams (FIT) and Evidence Gatherers, record footage and take photographs of campaigners as they enter and leave openly advertised public meetings. Surveillance officers are provided with "spotter cards" used to identify the faces of target individuals who police believe are at risk of becoming involved in domestic extremism. Targets include high-profile activists regularly seen taking part in protests.

Note: This important article should be read in its entirety. For further revelations of the magnitude of this surveillance and "rebranding protest as extremism " program, click here.

Three undercover officers accused of inciting protesters to attack riot police at the 2007 North American leaders summit in Montebello are being summoned to testify before Quebec's independent police ethics committee. The decision from the committee released this week overrules an independent review that exonerated the officers. It also comes more than two years after the black-clad trio were first exposed on YouTube. Dave Coles, the union leader who confronted the men at the time and filed a complaint against the police ... said he suspects an inquiry would find there was political involvement. “This is the big question: Who sent them in?” asked Mr. Coles. “And don't give me some lame excuse that it was a low-level officer.” Video images of the incident posted on YouTube showed three officers disguised as protesters wearing black tops and camouflage pants. Their faces were covered by black and white bandanas. One of them, wearing a sideways ball cap marked with graffiti, held a large stone in his hand. Mr. Coles yelled at them to show their faces and the officer carrying the rock responded with a two-handed shove.

Note: Click on the link above to watch the astonishing YouTube video of this police provocation. This is just one case that happened to be caught on film. Why are undercover police infiltrating activist groups and inciting violence at demonstrations around the world?

As demonstrations have evolved with the help of text messages and online social networks, so too has the response of law enforcement. On Thursday, F.B.I. agents descended on a house in Jackson Heights, Queens [NY], and spent 16 hours searching it. The most likely reason for the raid: a man who lived there had helped coordinate communications among protesters at the Group of 20 summit in Pittsburgh. The man, Elliot Madison, 41, a social worker who has described himself as an anarchist, had been arrested in Pittsburgh on Sept. 24 and charged with hindering apprehension or prosecution, criminal use of a communication facility and possession of instruments of crime. The Pennsylvania State Police said he was found in a hotel room with computers and police scanners while using the social-networking site Twitter to spread information about police movements. He has denied wrongdoing. American protesters first made widespread use of mass text messages in New York, during the 2004 Republican National Convention. Messages, sent as events unfolded, allowed demonstrators and others to react quickly to word of arrests, police mobilizations and roving rallies. Mass texting has since become a valued tool among protesters, particularly at large-scale demonstrations. Mr. Madison [may be] the first to be charged criminally while sending information electronically to protesters about the police. “He and a friend were part of a communications network among people protesting the G-20,” Mr. Madison’s lawyer, Martin Stolar, said on Saturday. “There’s absolutely nothing that he’s done that should subject him to any criminal liability.”

Note: For many reports from reliable sources on increasing government erosion of civil liberties, click here.

A bone fragment believed to be part of Adolf Hitler's skull has been revealed as being that of an unidentified woman, US scientists have said. The section of bone - marked with a bullet hole - was used to support the theory that Hitler shot himself. Russian scientists said the skull piece was found alongside Hitler's jawbone and had put it on display in Moscow. But US scientists said DNA tests revealed it actually belonged to a woman aged between 20 and 40. An archaeologist from the University of Connecticut travelled to Moscow, where the fragment has been on show in the city's federal archive since 2000, to take a sample. Nick Bellantoni said he had suspected even before the bone was tested that the fragment did not come from an adult male. DNA tests confirmed that the bone fragment came from a female. Doubts about exactly how Hitler died have persisted for decades. Russian officials said that the bodies of Hitler and Eva Braun - who reportedly committed suicide in a Berlin bunker in 1945 - were removed from a shell crater shortly after they died. The piece of skull forms part of a collection that also includes a section of a bloodstained sofa where Hitler is believed to have shot himself after swallowing a cyanide pill.

Long-secret security tapes showing the chaos immediately after the 1995 bombing of the Oklahoma City federal building are blank in the minutes before the blast and appear to have been edited, an attorney who obtained the recordings said Sunday. "The real story is what's missing," said Jesse Trentadue, a Salt Lake City attorney who obtained the recordings through the federal Freedom of Information Act as part of an unofficial inquiry he is conducting into the April 19, 1995, bombing that killed 168 people and injured hundreds more. The tapes turned over by the FBI came from security cameras various companies had mounted outside office buildings near the Alfred P. Murrah Federal Building. They are blank at points before 9:02 a.m., when a truck bomb carrying a 4,000-pound fertilizer-and-fuel-oil bomb detonated in front of the building, Trentadue said. "Four cameras in four different locations going blank at basically the same time on the morning of April 19, 1995. There ain't no such thing as a coincidence," Trentadue said. He said government officials claim the security cameras did not record the minutes before the bombing because "they had run out of tape" or "the tape was being replaced." "The absence of footage from these crucial time intervals is evidence that there is something there that the FBI doesn't want anybody to see." Trentadue said he is seeking more tapes along with a variety of bombing-related documents from the FBI and the CIA. An FOIA request by Trentadue for 26 CIA documents was rejected in June. A letter from the National Geospatial-Intelligence Agency, which reviewed the documents, said their release "could cause grave damage to our national security."

Note: This revealing article also tells how Trentadue's brother was murdered by FBI agents who mistakenly thought his brother was the bomber. For more valuable information on this and other evidence challenging the official story of the Oklahoma City bombing, click here.

As part of an expanding programme of battlefield automation, the US Air Force has said it is now training more drone operators than fighter and bomber pilots and signalled the end of the era of the fighter pilot is in sight. Just three years ago, the service was able to fly just 12 drones at a time; now it can fly more than 50. At a trade conference outside Washington last week, military contractors presented a future vision in which pilotless drones serve as fighters, bombers and transports, even automatic mini-drones programmed to attack in swarms. Contractors made presentations for "nano-size" drones the size of moths that can flit into buildings to gather intelligence; drone helicopters; large aircraft that could be used as strategic bombers and new mid-sized drones could act as jet fighters. This Terminator-like vision in which future generations of fighter aces become cubicle-bound drone operators thousands of miles from conflict is already here: the deployment that began during the Bush administration has accelerated during the first seven months of Obama's term. Some 5,000 robotic vehicles and drones are now deployed in Iraq and Afghanistan. By 2015, the Pentagon's $230bn arms procurement programme Future Combat Systems expects to robotise around 15% of America's armed forces. As US domestic approval for the "Af-Pak" conflict slips (a new Washington Post poll found less than a quarter of the US public support sending more troops to Afghanistan), the reliance of drones is likely to grow, analysts say. The air force study suggests areas of warfare too critical for automation, including dogfighting and nuclear-bombing, could eventually be handled by drones.

Note: For revealing reports on Pentagon war planning from major media sources, click here.

The senior senator from Alaska, Ted Stevens, enjoyed a reputation for inserting projects into the federal budget to benefit his home state, most notoriously a $223 million bridge from the town of Ketchikan to, well, not much of anyplace. In 1988, [physics] researchers sat down with Stevens and assured him that an ionospheric heater would be a bona fide scientific marvel and a guaranteed job creator, and it could be built for a mere $30 million. Just like that, the Pentagon had $10 million for ionospheric heater research. In a series of meetings in the winter of 1989-90, the field's leading lights ... pitched the Navy and the Air Force. Haarp, they asserted, could lead to "significant operational capabilities." They'd build a giant phased antenna array that would aim a finely tuned beam of high-frequency radio waves into the sky. The beam would excite electrons in the ionosphere, altering that spot's conductivity and inducing it to emit its own extremely low frequency waves, which could theoretically penetrate the earth's surface to reveal hidden bunkers or be used to contact deeply submerged submarines. Of course, the scientists said, you'd need a brand-new, state-of-the-art ionospheric heater to see if any of this was even feasible. The Pentagon ... began using Stevens' earmarked cash to fund the appropriate studies. For more than a year, planning proceeded largely out of public view. Then, in 1993, an Anchorage teachers' union rep named Nick Begich—son of one of Alaska's most important political families—found a notice about Haarp in the Australian conspiracy magazine Nexus. In 1995, he self-published a book, Angels Don't Play This HAARP. It sold 100,000 copies. He started giving speeches on Haarp's dangers everywhere, from UFO conventions to the European Parliament.

Note: For more excellent information on HAARP, click here. There is much more than meets the eye here.

Pope Urges Forming New World Economic Order to Work for the ‘Common Good’

Pope Benedict XVI [has] called for a radical rethinking of the global economy, criticizing a growing divide between rich and poor and urging the establishment of a “true world political authority” to oversee the economy and work for the “common good.” He criticized the current economic system, “where the pernicious effects of sin are evident,” and urged financiers in particular to “rediscover the genuinely ethical foundation of their activity.” He also called for “greater social responsibility” on the part of business. “Once profit becomes the exclusive goal, if it is produced by improper means and without the common good as its ultimate end, it risks destroying wealth and creating poverty,” Benedict wrote in his new encyclical, which the Vatican released on [July 7]. More than two years in the making, “Caritas in Veritate,” or “Charity in Truth,” is Benedict’s third encyclical since he became pope in 2005. Filled with terms like “globalization,” “market economy,” “outsourcing,” “labor unions” and “alternative energy,” it is not surprising that the Italian media reported that the Vatican was having difficulty translating the 144-page document into Latin. In many ways, the document is a puzzling cross between an anti-globalization tract and a government white paper, another signal that the Vatican does not comfortably fit into traditional political categories of right and left. Benedict also called for a reform of the United Nations so there could be a unified “global political body” that allowed the less powerful of the earth to have a voice, and he called on rich nations to help less fortunate ones.

An inventory of potentially deadly pathogens at Fort Detrick's infectious disease laboratory found more than 9,000 vials that had not been accounted for, Army officials said yesterday, raising concerns that officials wouldn't know whether dangerous toxins were missing. After four months of searching about 335 freezers and refrigerators at the U.S. Army Medical Research Institute of Infectious Diseases in Frederick, investigators found 9,220 samples that hadn't been included in a database of about 66,000 items listed as of February, said Col. Mark Kortepeter, the institute's deputy commander. The vials contained some dangerous pathogens, among them the Ebola virus, anthrax bacteria and botulinum toxin, and less lethal agents such as Venezuelan equine encephalitis virus and the bacterium that causes tularemia. Most of them, forgotten inside freezer drawers, hadn't been used in years or even decades. Officials said some serum samples from hemorrhagic fever patients dated to the Korean War. The overstock and the previous inaccuracy of the database raised the possibility that someone could have taken a sample outside the lab with no way for officials to know something was missing. The institute has been under pressure to tighten security in the wake of the 2001 anthrax attacks, which killed five people and sickened 17. FBI investigators say they think the anthrax strain used in the attacks originated at the Army lab, and its prime suspect, Bruce E. Ivins, researched anthrax there. Ivins committed suicide last year during an investigation into his activities.

Note: Fort Detrick is the home of the government lab which is suspected to be involved with the creation of many previously unknown lethal viruses and germs. For lots more, see the excellent work of Dr. Leonard Horowitz at this link and this one.

Schoolchildren could be first in line for swine flu vaccine this fall — and schools are being put on notice that they might even be turned into shot clinics. Health and Human Services Secretary Kathleen Sebelius said Tuesday she is urging school superintendents around the country to spend the summer preparing for that possibility, if the government goes ahead with mass vaccinations. "If you think about vaccinating kids, schools are the logical place," Sebelius told The Associated Press. No decision has been made yet on whether and how to vaccinate millions of Americans against the new flu strain that the World Health Organization last week formally dubbed a pandemic, meaning it now is circulating the globe unchecked. But the U.S. is pouring money into development of a vaccine in anticipation of giving at least some people the shots.
While swine flu doesn't yet seem any more lethal than the regular flu that each winter kills 36,000 people in the U.S. alone, scientists fear it may morph into a more dangerous type. Even in its current form, the WHO says about half of the more than 160 people worldwide killed by swine flu so far were previously young and healthy. If that trend continues, "the target may be school-age children as a first priority" for vaccination, Sebelius said Tuesday. "That's being watched carefully." The last mass vaccination against a different swine flu, in the U.S. in 1976, was marred by reports of a paralyzing side effect — for a feared outbreak that never happened. The secretary said: "The worst of all worlds is to have the vaccine cause more damage than the flu potential."

Note: This article admits "swine flu doesn't yet seem any more lethal than the regular flu that each winter kills 36,000 people in the U.S. alone." Be very cautious around any vaccination campaign. Vaccines are extremely poorly regulated and known to fill the wallets of rich politicians invested in them. For lots more reliable, verifiable information on this, click here.

The Pentagon plans to create a new military command for cyberspace ... stepping up preparations by the armed forces to conduct both offensive and defensive computer warfare. White House officials say Mr. Obama has not yet been formally presented with the Pentagon plan. But he is expected to sign a classified order in coming weeks that will create the military cybercommand, officials said. It is a recognition that the United States already has a growing number of computer weapons in its arsenal and must prepare strategies for their use — as a deterrent or alongside conventional weapons — in a wide variety of possible future conflicts. [A] main dispute has been over whether the Pentagon or the National Security Agency should take the lead in preparing for and fighting cyberbattles. Under one proposal still being debated, parts of the N.S.A. would be integrated into the military command so they could operate jointly. A classified set of presidential directives is expected to lay out the military’s new responsibilities and how it coordinates its mission with that of the N.S.A., where most of the expertise on digital warfare resides today. The decision to create a cybercommand is a major step beyond the actions taken by the Bush administration, which authorized several computer-based attacks but never resolved the question of how the government would prepare for a new era of warfare fought over digital networks. Officials declined to describe potential offensive operations, but said they now viewed cyberspace as comparable to more traditional battlefields.

Note: Combine this with the BBC's revealing article on US plans to fight the Internet, and there is reason for concern. For lots more on new developments in modern war planning, click here.

"New World Order," which premieres today on the Independent Film Channel, is a film about ... volunteers in an "information war" who see ... that 9/11 was an "inside job," that the military-industrial complex killed Kennedy, and that an international "power elite" is plotting to enslave us all, excepting for those it will kill outright. They are hard to pigeonhole politically, these conspiracy adepts, trusting neither the "socialist Democrats" nor the "fascist Republicans" -- Ron Paul seems to be their man, if anyone is -- yet sounding as often like '60s leftist radicals as right-wing militiamen. They take the 1st Amendment as seriously as any card-carrying member of the ACLU, styling themselves muckrakers and speakers of truth to power, often through a bullhorn. The man with the biggest bullhorn is Alex Jones, an Austin, Texas-based syndicated radio host ... and the point through which all the strands connect in this unexpectedly affecting, nonjudgmental documentary by Luke Meyer and Andrew Neel. Much of what Jones and his fellows and followers believe is, in a general way, hardly controversial. But whether 9/11 was a plot to bring on world government, or whether the government you already have has painted a red or blue dot on your mailbox to indicate whether you will be shot immediately or merely be sent to the "FEMA camps" when the American Armageddon arrives, well, that's a pale horse of a different color. (Still, you'll want to check your mailbox now.) "This is more important than how much Britney Spears' hair sold for on EBay, 'Dancing With the Stars' or who's gonna be America's next idol," says one believer. "People think this is a joke. We're not a joke."

Note: The disparaging tone of this review of the documentary is typical of mainstream media treatment of 9/11 truth activity, but it makes clear that the film itself does not share this attitude.

Stopping driver's license fraud is no laughing matter: Four states are ordering people to wipe the grins off their faces in their license photos. "Neutral facial expressions" are required at departments of motor vehicles (DMVs) in Arkansas, Indiana, Nevada and Virginia. That means you can't smile, or smile very much. Other states may follow. The serious poses are urged by DMVs that have installed high-tech software that compares a new license photo with others that have already been shot. When a new photo seems to match an existing one, the software sends alarms that someone may be trying to assume another driver's identity. But there's a wrinkle in the technology: a person's grin. Face-recognition software can fail to match two photos of the same person if facial expressions differ in each photo, says Carnegie Mellon University robotics professor Takeo Kanade. Dull expressions "make the comparison process more accurate," says Karen Chappell, deputy commissioner of the Virginia DMV, whose no-smile policy took effect in March. Arkansas, Indiana and Nevada allow slight smiles. "You just can't grin really large," Arkansas driver services chief Tonie Shields says. A total of 31 states do computerized matching of driver's license photos and three others are considering it, says the American Association of Motor Vehicle Administrators. Most say their software matches faces regardless of expressions. "People can smile here in Pennsylvania," state Transportation Department spokesman Craig Yetter says.

Note: For incisive commentary and a heart-warming video addressing this very topic, click here.

Some of America’s leading billionaires have met secretly to consider how their wealth could be used to slow the growth of the world’s population. Described as the Good Club by one insider, it included David Rockefeller Jr, the patriarch of America’s wealthiest dynasty, Warren Buffett and George Soros, the financiers, Michael Bloomberg, the mayor of New York, and the media moguls Ted Turner and Oprah Winfrey. They gathered at the home of Sir Paul Nurse, a British Nobel prize biochemist and president of the private Rockefeller University, in Manhattan on May 5. The informal afternoon session was so discreet that some of the billionaires’ aides were told they were at “security briefings”. Stacy Palmer, editor of the Chronicle of Philanthropy, said the summit was unprecedented. “We only learnt about it afterwards, by accident. Normally these people are happy to talk good causes, but this is different – maybe because they don’t want to be seen as a global cabal,” he said. Some details were emerging this weekend, however. Taking their cue from Gates they agreed that overpopulation was a priority. [A] guest said there was “nothing as crude as a vote” but a consensus emerged that they would back a strategy in which population growth would be tackled as a potentially disastrous environmental, social and industrial threat. “This is something so nightmarish that everyone in this group agreed it needs big-brain answers,” said the guest. “They need to be independent of government agencies, which are unable to head off the disaster we all see looming.”
Why all the secrecy? “They wanted to speak rich to rich without worrying anything they said would end up in the newspapers, painting them as an alternative world government,” he said.

Note: This very secret private meeting of billionaires planning to "solve" the world's "overpopulation" problem occurred just a few days before the latest Bilderberg meeting. For an ABC article on the same, click here. Is this a more positive twist on the Bilderberg Group of the worlds' power elite, or more of the same?

Children who get the annual flu vaccine, especially those who have asthma, may be more likely to be hospitalized than children who don't get the shot, a new study shows. But the researcher noted ... "This may not be a reflection of the vaccine but that these patients are the sickest, and their doctors insist they get a vaccination," said study author Dr. Avni Y. Joshi, a fellow at the Mayo Clinic in Rochester, Minn. "I would be very cautious about interpreting this," said Dr. Gurjit Khurana Hershey, director of asthma research and professor of pediatrics at Cincinnati Children's Hospital. "The bottom line is that kids with asthma who get the flu vaccine are probably a different population anyway. They may be the more severely ill children, so it may have very little to do with the vaccine." The study has too many unknowns and covers too wide an age range over too many flu seasons to indicate any change in recommendations, said Dr. Hank Bernstein, a member of the committee on infectious diseases of the American Academy of Pediatrics. The authors looked back at 263 children aged 6 months to 18 years who had visited the Mayo Clinic between 1999 and 2006 with laboratory-confirmed influenza. Children -- including children who had asthma -- who received the annual inactivated flu vaccine were almost three times more likely to be hospitalized than those who were not inoculated.

Note: With hospitalization rates nearly three times that of children who did not get vaccinated, why are these doctors downplaying this study so much? Why the focus on asthma, when the study covered a wide range of children? Why isn't anyone calling for more research on these striking results? For lots of articles raising serious questions about the safety of vaccines, click here.

An Australian researcher claims the swine flu, which has killed at least 64 people so far, might not be a mutation that occurred naturally but a man-made product of genetic experiments accidently leaked from a laboratory -- a theory the World Health Organization is taking very seriously. Adrian Gibbs, a scientist on the team that was behind the development of Tamiflu, says in a report he is submitting today that swine flu might have been created using eggs to grow viruses and make new vaccines, and could have been accidently leaked to the general public. "It might be some sort of simple error that's not being recognized," Gibbs said on ABC's "Good Morning America." In an interview with Bloomberg Television, Gibbs admitted there are other ways to explain swine flu's origin. "One of the simplest explanations if that it's a laboratory escape, but there are lots of others," he said. Regardless of the validity of Gibb's claims, he and several experts say that just bringing the idea of laboratory security to the public's attention is important. "There are lives at risk," Gibbs said. "The sooner this idea gets out, the better."

Note: What would cause one of the developers of Tamiflu to make such a statement? If you read between the lines, there is much more here than meets the eye. For lots more on this intriguing development, click here.

The National Security Agency has been campaigning to lead the government’s rapidly growing cybersecurity programs, raising privacy and civil liberties concerns among some officials who fear that the move could give the spy agency too much control over government computer networks. The security agency’s interest in taking over the dominant role has met resistance, including the resignation of the Homeland Security Department official who was until last month in charge of coordinating cybersecurity efforts throughout the government. Rod Beckstrom, who resigned in March as director of the National Cyber Security Center at the Homeland Security Department, said ... that he feared that the N.S.A.’s push for a greater role in guarding the government’s computer systems could give it the power to collect and analyze every e-mail message, text message and Google search conducted by every employee in every federal agency. Mr. Beckstrom said he believed that an intelligence service that is supposed to focus on foreign targets should not be given so much control over the flow of information within the United States government. To detect threats against the computer infrastructure — including hackers, viruses and intrusions by foreign agents and terrorists — cybersecurity guardians must have virtually unlimited access to networks. Mr. Beckstrom argues that those responsibilities should be divided among agencies. “I have very serious concerns about the concentration of too much power in one agency,” he said. “Power over information is so important, and it is so difficult to monitor, that we need to have checks and balances.”

Note: For further disturbing reports from reliable sources on government efforts to establish total surveillance systems, click here.

Electronic surveillance and collection of personal data are "pervasive" in British society and threaten to undermine democracy, peers [in the House of Lords] have warned. CCTV cameras and the DNA database were two examples of threats to privacy, the Lords constitution committee said. It called for compensation for people subject to illegal surveillance. Civil liberties campaigners have warned about the risks of a "surveillance society" in which the state acquires ever-greater powers to track people's movements and retain personal data. In its report, the Lords constitution committee said growth in surveillance by both the state and the private sector risked threatening people's right to privacy, which it said was "an essential pre-requisite to the exercise of individual freedom". People were often unaware of the scale of personal information held and exchanged by public bodies, it said. "There can be no justification for this gradual but incessant creep towards every detail about us being recorded and pored over by the state," committee chairman and Tory peer Lord Goodlad said. "The huge rise in surveillance and data collection by the state and other organisations risks undermining the long-standing tradition of privacy and individual freedom which are vital for democracy," Lord Goodlad added. Human rights campaigners Liberty welcomed the report.

Note: For key reports from major media sources on growing threats to privacy from governments and corporations, click here.

U.S. spy agencies' sensitive data should soon be linked by Google-like search systems.
Director of National Intelligence Mike McConnell has launched a sweeping technology program to knit together the thousands of databases across all 16 spy agencies. After years of bureaucratic snafus, intelligence analysts will be able to search through secret intelligence files the same way they can search public data on the Internet. Linking up the 16 agencies is the challenge at the heart of the job of director of national intelligence, created after 9/11. The new information program also is designed to include Facebook-like social-networking programs and classified news feeds. It includes enhanced security measures to ensure that only appropriately cleared people can access the network. The price tag is expected to be in the billions of dollars. The impact for analysts, Mr. McConnell says, "will be staggering." Not only will analysts have vastly more data to examine, potentially inaccurate intelligence will stand out more clearly, he said. Today, an analyst's query might scan only 5% of the total intelligence data in the U.S. government, said a senior intelligence official. Even when analysts find documents, they sometimes can't read them without protracted negotiations to gain access. Under the new system, an analyst would likely search about 95% of the data, the official said.

Note: For key reports from reliable sources on the hidden realities of the War on Terror, click here.

This is the year when automated face-recognition finally goes mainstream, and it's about time we considered its social and political implications. Researchers are developing sharply accurate scanners that monitor faces in 3D and software that analyses skin texture to turn tiny wrinkles, blemishes and spots into a numerical formula. The strongest face-recognition algorithms are now considered more accurate than most humans - and already the Home Office and the Association of Chief Police Officers have held discussions about the possibility of linking such systems with automatic car-numberplate recognition and public-transport databases. Join everything together via the internet, and voilŕ - the nation's population, down to the individual Times reader, can be conveniently and automatically monitored in real time. So let's understand this: governments and police are planning to implement increasingly accurate surveillance technologies that are unnoticeable, cheap, pervasive, ubiquitous, and searchable in real time. And private businesses, from bars to workplaces, will also operate such systems, whose data trail may well be sold on or leaked to third parties - let's say, insurance companies that have an interest in knowing about your unhealthy lifestyle, or your ex-spouse who wants evidence that you can afford higher maintenance payments.

Note: For disturbing reports on threats to privacy from major media sources, click here.

The [U.K.] government has been accused of trampling on individual liberties by proposing wide-ranging new powers for bailiffs to break into homes and to use “reasonable force” against householders who try to protect their valuables. Under the regulations, bailiffs for private firms would for the first time be given permission to restrain or pin down householders. They would also be able to force their way into homes to seize property to pay off debts, such as unpaid credit card bills and loans. “These laws strip away tried and tested protections that make a person’s home his castle, and which have stood for centuries,” said Paul Nicolson, chairman of the Zacchaeus 2000 Trust, a London-based welfare charity. “They could clearly lead to violent confrontations and undermine fundamental liberties.” Bailiffs have for hundreds of years been denied powers to break into homes for civil debt or to use force against debtors, except in self-defence. Ministers have now proposed bailiffs be given powers to physically remove debtors who try to defend their property, for example by draping themselves over a car or blocking the door of their home. Details of the new guidelines were obtained under freedom of information laws. Reasonable grounds for breaking down the door include the “movement of a curtain”, a radio being heard or a figure being spotted inside which “may be the offender”. In one case, an 89-year-old grandmother returned home to find a bailiff sitting in her chair having drawn up a list of her possessions. He was pursuing a parking fine owed by her son, who did not even live at the address.

Note: For many disturbing reports from reliable sources on threats to civil liberties, click here.

Using technology originally developed for mass disasters, Boston disease trackers are embarking on a novel experiment - one of the first in the country - aimed at eventually creating a citywide registry of everyone who has had a flu vaccination. The resulting vaccination map would allow swift intervention in neighborhoods left vulnerable to the fast-moving respiratory illness. The trial starts this afternoon, when several hundred people are expected to queue up for immunizations at the headquarters of the Boston Public Health Commission. Each of them will get a bracelet printed with a unique identifier code. Information about the vaccine's recipients, and the shot, will be entered into handheld devices similar to those used by delivery truck drivers. Infectious disease specialists in Boston and elsewhere predicted that the registry approach could prove even more useful if something more sinister strikes: a bioterrorism attack or the long-feared arrival of a global flu epidemic. In such crises, the registry could be used to track who received a special vaccine or antidote to a deadly germ. "Anything you can do to better pinpoint who's vaccinated and who's not, that's absolutely vital," said Michael Osterholm, director of the Center for Infectious Disease Research & Policy at the University of Minnesota. "I wish more cities were doing this kind of thing." When people arrive for their shots, they will get an ID bracelet with a barcode. Next, basic information - name, age, gender, address - will be entered into the patient tracking database. There will be electronic records, too, of who gave the vaccine and whether it was injected into the right arm or the left, and time-stamped for that day.

Note: For more on the serious risks and dangers posed by vaccines, click here and here.

The beginning of the first serious experiments using CERN’s Large Hadron Collider this week has given rise to a welter of fanciful scare stories about the obliteration of the Earth by a pocket black hole or a cascade reaction of exotic particles. Similar predictions have been made around the launch of several other particle physics experiments and even the first atomic weapons tests. Predictions of the world’s end are nothing new though. We’ve picked out 30 of the most memorable apocalypses that never, for one reason or another, quite happened. 1: 2,800BC: The oldest surviving prediction of the world’s imminent demise was found inscribed upon an Assyrian clay tablet which stated: "Our earth is degenerate in these latter days. There are signs that the world is speedily coming to an end. Bribery and corruption are common." 4: Mar 25, 970 AD. The Lotharingian computists believed they had found evidence in the Bible that a conjunction of certain feast days prefigured the end times. They were just one of a wide scattering of millennial cults springing up in advance of that first Millennium. The millennial panic endured for at least 30 years after the fateful date had come and gone, with some adjustment made to allow 1,000 years after the crucifixion, rather than the nativity. 8: 1648: Having made close study of the kabbalah, theTurkish rabbi Sabbatai Zevi predicted that the Messiah would make a miraculous return in 1648, and that his name would be Sabbatai Zevi. 9: 1666: A year packed with apocalyptic portent. With a date containing the figures commonly accepted as the biblical Number of the Beast and following a protracted period of plague in England, it was little surprise that many should believe the Great Fire of London to be a herald of the Last Days.

The Justice Department has proposed a new domestic spying measure that would make it easier for state and local police to collect intelligence about Americans, share the sensitive data with federal agencies and retain it for at least 10 years. Law enforcement agencies would be allowed to target groups as well as individuals, and to launch a criminal intelligence investigation based on the suspicion that a target is engaged in terrorism or providing material support to terrorists. They also could share results with a constellation of federal law enforcement and intelligence agencies, and others in many cases. Michael German, policy counsel for the American Civil Liberties Union, said the proposed rule may [permit] police to collect intelligence even when no underlying crime is suspected. German, an FBI agent for 16 years, said easing established limits on intelligence-gathering would lead to abuses against peaceful political dissenters. He pointed to reports in the past six years that undercover New York police officers infiltrated protest groups before the 2004 Republican National Convention; that California state agents eavesdropped on peace, animal rights and labor activists; and that Denver police spied on Amnesty International and others before being discovered. "If police officers no longer see themselves as engaged in protecting their communities from criminals and instead as domestic intelligence agents working on behalf of the CIA, they will be encouraged to collect more information," German said. "It turns police officers into spies on behalf of the federal government."

Note: For many disturbing reports on increasing threats to civil liberties from reliable sources, click here.

Across the country, police are using GPS devices to snare [criminal suspects], often without a warrant or court order. Privacy advocates said tracking suspects electronically constitutes illegal search and seizure, violating Fourth Amendment rights of protection against unreasonable searches and seizures, and is another step toward George Orwell's Big Brother society. With the ... ever-declining cost of the technology, many analysts believe that police will increasingly rely on GPS ... and that the public will hear little about it. "I've seen them in cases from New York City to small towns -- whoever can afford to get the equipment and plant it on a car," said John Wesley Hall, president of the National Association of Criminal Defense Lawyers. "And of course, it's easy to do. You can sneak up on a car and plant it at any time." Details on how police use GPS usually become public when the use of the device is challenged in court. Leibig said GPS should be held to a different standard because it provides greater detail. "While it may be true that police can conduct surveillance of people on a public street without violating their rights, tracking a person everywhere they go and keeping a computer record of it for days and days without that person knowing is a completely different type of intrusion," he said. Barry Steinhardt, director of the American Civil Liberties Union's technology and liberty program, considers GPS monitoring, along with license plate readers, toll transponders and video cameras with face-recognition technology, part of the same trend toward "an always-on, surveillance society."

Note: For lots more on threats to privacy from major media sources, click here.

Federal agents may take a traveler's laptop computer or other electronic device to an off-site location for an unspecified period of time without any suspicion of wrongdoing, as part of border search policies the Department of Homeland Security recently disclosed. Also, officials may share copies of the laptop's contents with other agencies and private entities for language translation, data decryption or other reasons, according to the policies, dated July 16 and issued by two DHS agencies, U.S. Customs and Border Protection and U.S. Immigration and Customs Enforcement. "The policies . . . are truly alarming," said Sen. Russell Feingold (D-Wis.), who is probing the government's border search practices. He said he intends to introduce legislation soon that would require reasonable suspicion for border searches, as well as prohibit profiling on race, religion or national origin. DHS officials said the newly disclosed policies ... apply to anyone entering the country, including U.S. citizens. Civil liberties and business travel groups have pressed the government to disclose its procedures as an increasing number of international travelers have reported that their laptops, cellphones and other digital devices had been taken -- for months, in at least one case -- and their contents examined. The policies cover "any device capable of storing information in digital or analog form," including hard drives, flash drives, cellphones, iPods, pagers, beepers, and video and audio tapes. They also cover "all papers and other written documentation," including books, pamphlets and "written materials commonly referred to as 'pocket trash' or 'pocket litter.' "

Note: For many reports from reliable, verifiable sources on threats to privacy, click here.

Nearly 40 years ago, the FBI was roundly criticized for investigating Americans without evidence [that] they had broken any laws. Now, critics fear the FBI may be gearing up to do it again. Tentative Justice Department guidelines, to be released later this summer, would let agents investigate people whose backgrounds -- and potentially their race or ethnicity -- match the traits of terrorists. Such profiling ... echoes the FBI's now-defunct COINTELPRO, an operation under Director J. Edgar Hoover in the 1950s and 1960s to monitor and disrupt groups with communist and socialist ties. Before it was shut down in 1971, the domestic spying operation -- formally known as Counterintelligence Programs -- had expanded to include civil rights groups, anti-war activists, ... state legislators and journalists. Among the FBI's targets were Martin Luther King Jr., Malcolm X, and John Lennon, along with members of black [political] groups ... and student protesters. The new proposal to allow investigations of Americans with no evidence of wrongdoing is "COINTELPRO for the 21st century," said Barry Steinhardt of the American Civil Liberties Union. "But this is much more insidious because it could involve more people. In the days of COINTELPRO, they were watching only a few people. Now they could be watching everyone."

Note: For many disturbing reports on threats to civil liberties, click here.

America is ruled by an “intelligence-industrial complex” whose allegiance is not to the taxpaying public but to a cabal of private-sector contractors. That is the central thesis of Spies for Hire: The Secret World of Intelligence Outsourcing by Tim Shorrock, ... an investigative journalist. His book [provides a] disturbing overview of the intelligence community, also known as “the I.C.” Mr. Shorrock says our government is outsourcing 70 percent of its intelligence budget, or more than $42 billion a year, to a “secret army” of corporate vendors. Because of accelerated privatization efforts after 9/11, these companies are participating in covert operations and intelligence-gathering activities that were considered “inherently governmental” functions reserved for agencies like the Central Intelligence Agency, he says. Some of the book’s most intriguing assertions concern the permeating influence of the consulting firm Booz Allen Hamilton. In 2006, Mr. Shorrock reports, Booz Allen amassed $3.7 billion in revenue, much of which came from classified government contracts exempt from public oversight. Among its more than 18,000 employees are R. James Woolsey, the former C.I.A. director, and Joan Dempsey, a former longtime United States intelligence official who declared in a 2004 speech, “I like to refer to Booz Allen as the shadow I.C.” The “revolving door” between Booz Allen and the I.C. is personified by Mike McConnell, who joined the firm after serving as head of the National Security Agency under President Bill Clinton, only to return as director of national intelligence under President Bush.

Note: For revealing reports on government corruption from reliable sources, click here.

Procurement documents released by the U.S. Air Force give a rare glimpse into Pentagon plans for developing an offensive cyber-war capacity that can infiltrate, steal data from and, if necessary, take down enemy information-technology networks. The Broad Area Announcement, posted ... by the Air Force Research Laboratory's Information Directorate, outlines a two-year, $11 million effort to develop capabilities to "access ... any remotely located open or closed computer information systems," lurk on them "completely undetected," "stealthily exfiltrate information" from them and ultimately "be able to affect computer information systems through Deceive, Deny, Disrupt, Degrade, Destroy (D5) effects." "Of interest," the announcement says, "are any and all techniques to enable user and/or root-level access to both fixed [and] mobile computing platforms ... [and] methodologies to enable access to any and all operating systems, patch levels, applications and hardware." The announcement is the latest stage in the Air Force's effort to develop a cyber-war capability and establish itself as the service that delivers U.S. military power in cyberspace. Last year, the Air Force announced it was setting up a Cyberspace Command ... and was developing military doctrine for the prosecution of cyber-war operations. The developments highlight the murky legal territory on which the cyber-wars of the future will be fought. More important, because of the difficulties in identifying attackers and immediately quantifying damage from a cyber-attack, it can be hard to determine when such attacks constitute an act of war as opposed to crime or even vandalism.

The Bush administration said yesterday that it plans to start using the nation's most advanced spy technology for domestic purposes soon, rebuffing challenges by House Democrats over the idea's legal authority. Homeland Security Secretary Michael Chertoff said his department will activate his department's new domestic satellite surveillance office in stages, starting as soon as possible. Sophisticated overhead sensor data will be used for law enforcement once privacy and civil rights concerns are resolved, he said. His statements marked a fresh determination to operate the department's new National Applications Office. But Congress delayed launch of the new office last October. Critics cited its potential to expand the role of military assets in domestic law enforcement, to turn new or as-yet-undeveloped technologies against Americans without adequate public debate, and to divert the existing civilian and scientific focus of some satellite work to security uses. Democrats say Chertoff has not spelled out what federal laws govern the NAO, whose funding and size are classified. Congress barred Homeland Security from funding the office until its investigators could review the office's operating procedures and safeguards. The department submitted answers on Thursday, but some lawmakers promptly said the response was inadequate. [Rep. Bennie G. Thompson (D-Miss.), chairman of the House Homeland Security Committee] said, "We still don't know whether the NAO will pass constitutional muster since no legal framework has been provided."

Note: For many more revealing stories on threats to civil liberties, click here.

For more than 50 years, the National Prayer Breakfast has been a Washington institution. Every president has attended the breakfast since Eisenhower. Besides the presidents ... the one constant presence at the National Prayer Breakfast has been Douglas Coe. Although he’s not an ordained minister, the 79-year-old Coe is the most important religious leader you've never seen or heard. Scores of senators in both parties ... go to small weekly Senate prayer groups that Coe attends, [including] senators John McCain, Barack Obama and Hillary Clinton. Observers who have investigated Coe’s group, called The Fellowship Foundation, [describe] a secretive organization. Coe repeatedly urges a personal commitment to Jesus Christ. It’s a commitment Coe compares to the blind devotion that Adolph Hitler demanded. "Hitler, Goebbels and Himmler. Think of the immense power these three men had.” Coe also quoted Jesus and said: “One of the things [Jesus] said is 'If any man comes to me and does not hate his father, mother, brother, sister, his own life, he can't be a disciple.’" Writer Jeff Sharlet ... lived among Coe's followers six years ago, and came out troubled by their secrecy and rhetoric. “We were being taught the leadership lessons of Hitler, Lenin and Mao. Hitler’s genocide wasn’t really an issue for them. It was the strength that he emulated,” said Sharlet, who ... has now written about The Fellowship, also known to insiders as The Family, in [a] book called The Family: The Secret Fundamentalism at the Heart of American Power.

Note: This article strangely has been removed from the MSNBC website, though you can still access it using the Internet Archive. Watch the incredible four-minute NBC video clip showing Coe praising a communist Red Guard member for cutting the head off his mother at this link. For more on Coe's powerful links to Congress and corruption, see the MSNBC article available here. And for powerful inside information from a mind programmer who claims to have escaped from "the family," and another who says he is from a very high level there, click here and here. To develop an understanding of the bigger picture behind all of this, click here.

When the nation's intelligence agencies wanted a computer network to better share information ... they turned to a big name in the technology industry to supply some of the equipment: Google Inc. The Mountain View company sold the agencies servers for searching documents. Many of the contracts are for search appliances - servers for storing and searching internal documents. Agencies can use the devices to create their own mini-Googles on intranets made up entirely of government data. Additionally, Google has had success licensing a souped-up version of its aerial mapping service, Google Earth. Spy agencies are using Google equipment as the backbone of Intellipedia, a network aimed at helping agents share intelligence. [The system] is maintained by the director of national intelligence and is accessible only to the CIA, FBI, National Security Agency and an alphabet soup of other intelligence agencies and offices. Google supplies the computer servers that support the network, as well as the search software that allows users to sift through messages and data. Because of the complexities of doing business with the government, Google uses resellers to process orders on its behalf. Google takes care of the sales, marketing and management of the accounts. Google is one of many technology vendors vying for government contracts. On occasion, Google is the target of conspiracy theories from bloggers who say it is working with spy agencies more closely than simply selling search equipment.

Several thousand law enforcement agencies are creating the foundation of a domestic intelligence system through computer networks that analyze vast amounts of police information. As federal authorities struggled to meet information-sharing mandates after the Sept. 11, 2001 terrorist attacks, police agencies from Alaska and California to the Washington region poured millions of ... records into shared digital repositories called data warehouses, giving investigators and analysts new power to discern links among people, patterns of behavior and other hidden clues. Those network efforts will begin expanding further this month, as some local and state agencies connect to a fledgling Justice Department system called the National Data Exchange, or N-DEx. The expanding police systems illustrate the prominent roles that private companies play in homeland security and counterterrorism efforts. They also underscore how the use of new data -- and data surveillance -- is evolving faster than the public's understanding or the laws intended to check government power and protect civil liberties. Three decades ago, Congress imposed limits on domestic intelligence activity after revelations that the FBI, Army, local police and others had misused their authority for years to build troves of personal dossiers and monitor political activists and other law-abiding Americans. Since those reforms, police and federal authorities have observed a wall between law enforcement information-gathering, relating to crimes and prosecutions, and more open-ended intelligence that relates to national security and [politics]. That wall is fast eroding following the passage of laws expanding surveillance authorities, the push for information-sharing networks, and the expectation that local and state police will play larger roles.

Note: For many revealing reports from reliable sources of serious threats to civil liberties, click here.

The Electronic Frontier Foundation and Asian Law Caucus, two civil liberties groups in San Francisco, [have filed] a lawsuit to force the government to disclose its policies on border searches, including which rules govern the seizing and copying of the contents of electronic devices. They also want to know the boundaries for asking travelers about their political views, religious practices and other activities potentially protected by the First Amendment. The lawsuit was inspired by two dozen cases, 15 of which involved searches of cellphones, laptops, MP3 players and other electronics. Almost all involved travelers of Muslim, Middle Eastern or South Asian background. "It's one thing to say it's reasonable for government agents to open your luggage," said David D. Cole, a law professor at Georgetown University. "It's another thing to say it's reasonable for them to read your mind and everything you have thought over the last year. What a laptop records is as personal as a diary but much more extensive. It records every Web site you have searched. Every e-mail you have sent. It's as if you're crossing the border with your home in your suitcase." Mark Rasch, a technology security expert with FTI Consulting and a former federal prosecutor, [said] "Your kid can be arrested because they can't prove the songs they downloaded to their iPod were legally downloaded," he said. "Lawyers run the risk of exposing sensitive information about their client. Trade secrets can be exposed to customs agents with no limit on what they can do with it. Journalists can expose sources, all because they have the audacity to cross an invisible line."

Note: For many recent stories on threats to our civil liberties, click here.

U.S. intelligence officials are [now claiming] that popular Internet services that enable computer users to adopt cartoon-like personas in three-dimensional online spaces also are creating security vulnerabilities by opening novel ways ... to move money, organize and conduct corporate espionage. Over the last few years, "virtual worlds" such as Second Life and other role-playing games have become home to millions of computer-generated personas known as avatars. By directing their avatars, people can take on alternate personalities, socialize, explore and earn and spend money across uncharted online landscapes. Nascent economies have sprung to life in these 3-D worlds, complete with currency, banks and shopping malls. Corporations and government agencies have opened animated virtual offices, and a growing number of organizations hold meetings where avatars gather and converse in newly minted conference centers. Intelligence officials ... say they're convinced that the qualities that many computer users find so attractive about virtual worlds -- including anonymity, global access and the expanded ability to make financial transfers outside normal channels -- have turned them into seedbeds for transnational threats. The government's growing concern seems likely to make virtual worlds the next battlefield in the struggle over the proper limits on the government's quest to [expand] data collection and analysis and the surveillance of commercial computer systems. Virtual worlds could also become an actual battlefield. The intelligence community has begun contemplating how to use Second Life and other such communities as platforms for cyber weapons.

Since 9/11, and seemingly without the notice of most Americans, the federal government has assumed the authority to institute martial law, arrest a wide swath of dissidents (citizen and noncitizen alike), and detain people without legal or constitutional recourse in the event of "an emergency influx of immigrants in the U.S., or to support the rapid development of new programs." Beginning in 1999, the government has entered into a series of single-bid contracts with Halliburton subsidiary Kellogg, Brown and Root (KBR) to build detention camps at undisclosed locations within the United States. The government has also contracted with several companies to build thousands of railcars, some reportedly equipped with shackles, ostensibly to transport detainees. According to diplomat and author Peter Dale Scott, the KBR contract is part of a Homeland Security plan titled ENDGAME, which sets as its goal the removal of "all removable aliens" and "potential terrorists." What kind of "new programs" require the construction and refurbishment of detention facilities in nearly every state of the union with the capacity to house perhaps millions of people? The 2007 National Defense Authorization Act (NDAA) ... gives the executive the power to invoke martial law. The Military Commissions Act of 2006 ... allows for the indefinite imprisonment of anyone who ... speaks out against the government's policies. The law calls for secret trials for citizens and noncitizens alike. What could the government be contemplating that leads it to make contingency plans to detain without recourse millions of its own citizens?

Note: This important warning from former U.S. Congressman Dan Hamburg and Lewis Seiler should be read in its entirety. For more chilling reports on serious threats to our civil liberties, click here.

Here's a vision of the not-so-distant future: Microchips with antennas will be embedded in virtually everything you buy, wear, drive and read, allowing retailers and law enforcement to track consumer items -- and, by extension, consumers -- wherever they go, from a distance. A seamless, global network of electronic "sniffers" will scan radio tags in myriad public settings, identifying people and their tastes instantly so that customized ads, "live spam," may be beamed at them. In "Smart Homes," sensors built into walls, floors and appliances will inventory possessions, record eating habits, monitor medicine cabinets -- all the while, silently reporting data to marketers eager for a peek into the occupants' private lives. Science fiction? In truth, much of the radio frequency identification [RFID] technology that enables objects and people to be tagged and tracked wirelessly already exists -- and new and potentially intrusive uses of it are being patented, perfected and deployed. Some of the world's largest corporations are vested in the success of RFID technology, which couples highly miniaturized computers with radio antennas to broadcast information about sales and buyers to company databases. Already, microchips are turning up in some computer printers, car keys and tires, on shampoo bottles and department store clothing tags. They're also in library books and "contactless" payment cards. With tags in so many objects, relaying information to databases that can be linked to credit and bank cards, almost no aspect of life may soon be safe from the prying eyes of corporations and governments, says Mark Rasch, former head of the computer-crime unit of the U.S. Justice Department.

President Bush signed a directive this month that expands the intelligence community's role in monitoring Internet traffic to protect against a rising number of attacks on federal agencies' computer systems. The directive, whose content is classified, authorizes the intelligence agencies, in particular the National Security Agency, to monitor the computer networks of all federal agencies -- including ones they have not previously monitored. The NSA has particular expertise in monitoring a vast, complex array of communications systems -- traditionally overseas. The prospect of aiming that power at domestic networks is raising concerns, just as the NSA's role in the government's warrantless domestic-surveillance program has been controversial. "Agencies designed to gather intelligence on foreign entities should not be in charge of monitoring our computer systems here at home," said Rep. Bennie Thompson (D-Miss.), chairman of the House Homeland Security Committee. The classified joint directive, signed Jan. 8 and called the National Security Presidential Directive 54/Homeland Security Presidential Directive 23, has not been previously disclosed. Allowing a spy agency to monitor domestic networks is worrisome, said James X. Dempsey, policy director of the Center for Democracy and Technology. "We're concerned that the NSA is claiming such a large role over the security of unclassified systems," he said. "They are a spy agency as well as a communications security agency. They operate in total secrecy. That's not necessary and not the most effective way to protect unclassified systems."

Note: For revealing reports from major media sources on the increasing surveillance of all aspects of society by secret government programs, click here.

Microsoft is developing Big Brother-style software capable of remotely monitoring a worker’s productivity, physical wellbeing and competence. The Times has seen a patent application filed by the company for a computer system that links workers to their computers via wireless sensors that measure their metabolism. The system would allow managers to monitor employees’ performance by measuring their heart rate, body temperature, movement, facial expression and blood pressure. Unions said they fear that employees could be dismissed on the basis of a computer’s assessment of their physiological state. This is believed to be the first time a company has proposed developing such software for mainstream workplaces. Microsoft submitted a patent application in the US for a “unique monitoring system” that could link workers to their computers. Wireless sensors could read “heart rate, galvanic skin response, EMG, brain signals, respiration rate, body temperature, movement facial movements, facial expressions and blood pressure”, the application states. The system could also “automatically detect frustration or stress in the user”. Physical changes to an employee would be matched to an individual psychological profile based on a worker’s weight, age and health. If the system picked up an increase in heart rate or facial expressions suggestive of stress or frustration, it would tell management. Civil liberties groups and privacy lawyers strongly criticised the potential of the system for “taking the idea of monitoring people at work to a new level”.

Note: For revealing reports from major media sources on the increasing surveillance of all aspects of society by secret government and corporate programs, click here.

Transcript: [Suzanne] MALVEAUX: A Texas mystery solved -- at least partially. We now know Houston police are going to start using unmanned drone aircraft. But the question remains, well, for what? Stephen Dean of CNN affiliate KPRC has got an exclusive look. STEPHEN DEAN, KPRC CORRESPONDENT (voice-over): HPD [Houston Police Dept.], the federal Department of Homeland Security and other invited guests all watching to see how this drone could be used for police work in and around Houston. We tracked that drone from News Chopper 2. And that drone was able to use a high-powered camera to track us. Those cameras can actually look into people's homes or even follow them in moving cars -- which raises all sorts of new questions. HPD quickly hustled together a news conference when it realized our cameras were there for the entire secret test. Executive Assistant Chief Martha Mantabo admits that could mean covert police action. But she says it's too early to tell what else HPD will do with the aircraft. We asked, are these drones headed for ticketing speeders from the sky? MONTALVO: I'm not ruling anything out. DEAN: Back at the secret test site, police helicopter pilots claimed the entire air space was restricted and even threatened our local 2 Investigates pilot with action from the FAA if we didn't leave. But we checked with FAA several times and there never was a flight restriction. That leaves some to wonder whether the police are now ready to use terrorism fears since 911 to push the envelope further into our private lives.

With overwhelming bipartisan support, Rep. Jane Harman's "Violent Radicalization and Homegrown Terrorism Prevention Act" passed the House 404-6 late last month. Swift Senate passage appears certain. Not since the "Patriot Act" of 2001 has any bill so threatened our constitutionally guaranteed rights. Diverse groups vigorously oppose Ms. Harman's effort to stifle dissent. Unfortunately, the mainstream press and leading presidential candidates remain silent. Ms. Harman ... thinks it likely that the United States will face a native brand of terrorism in the immediate future and offers a plan to deal with ideologically based violence. But her plan is a greater danger to us than the threats she fears. Her bill tramples constitutional rights by creating a commission with sweeping investigative power and a mandate to propose laws prohibiting whatever the commission labels "homegrown terrorism." The proposed commission is a menace through its power to hold hearings, take testimony and administer oaths, an authority granted to even individual members of the commission - little Joe McCarthys - who will tour the country to hold their own private hearings. Ms. Harman's proposal includes an absurd attack on the Internet ... and legalizes an insidious infiltration of targeted organizations. While Ms. Harman denies that her proposal creates "thought police," it defines "homegrown terrorism" as "planned" or "threatened" use of force to coerce the government or the people in the promotion of "political or social objectives." That means that no force need actually have occurred as long as the government charges that the individual or group thought about doing it. Any social or economic reform is fair game. The bill defines "violent radicalization" as promoting an "extremist belief system." But American governments, state and national, have a long history of interpreting radical "belief systems" as inevitably leading to violence to facilitate change.

Note: For many major media reports on serious new threats to civil liberties, click here.

According to a former AT&T employee, the government has warrantless access to a great deal of Internet traffic should they care to take a peek. As information is traded between users it flows also into a locked, secret room on the sixth floor of AT&T's San Francisco offices and other rooms around the country -- where the U.S. government can sift through and find the information it wants, former AT&T employee Mark Klein alleged Wednesday at a press conference on Capitol Hill. "An exact copy of all Internet traffic that flowed through critical AT&T cables -- e-mails, documents, pictures, Web browsing, voice-over-Internet phone conversations, everything -- was being diverted to equipment inside the secret room," he said. Klein ... said that as an AT&T technician overseeing Internet operations in San Francisco, he helped maintain optical splitters that diverted data en route to and from AT&T customers. One day he found that the splitters were hard-wired into a secret room on the sixth floor. Documents he obtained [from] AT&T showed that highly sophisticated data mining equipment was kept there. Conversations he had with other technicians and the AT&T documents led Klein to believe there are 15 to 20 such sites nationwide, including in Seattle, Los Angeles, San Jose, San Diego and Atlanta, he said. Brian Reid, a former Stanford electrical engineering professor who appeared with Klein, said the NSA would logically collect phone and Internet data simultaneously because of the way fiber optic cables are intertwined. He said ... the system described by Klein suggests a "wholesale, dragnet surveillance." Of the major telecom companies, only Qwest is known to have rejected government requests for access to data. Former Qwest CEO Joseph Nacchio, appealing an insider trading conviction last month, said the government was seeking access to data even before Sept. 11.

The Prince Group, the holding company that owns Blackwater Worldwide, has been building an operation that will [develop] intelligence ... for clients in industry and government. The operation, Total Intelligence Solutions, has assembled a roster of former ... high-ranking figures from agencies such as the CIA and defense intelligence. Its chairman is Cofer Black, the former head of counterterrorism at CIA known for his leading role in many of the agency's more controversial programs, including the rendition and interrogation of ... suspects and the detention of some of them in secret prisons overseas. Its chief executive is Robert Richer, a former CIA associate deputy director of operations who was heavily involved in running the agency's role in the Iraq war. Because of its roster and its ties to owner Erik Prince, the multimillionaire former Navy SEAL, the company's thrust into this world highlights the blurring of lines between government, industry and activities formerly reserved for agents operating in the shadows. Richer, for instance, once served as the chief of the CIA's Near East division and is said to have ties to King Abdullah of Jordan. The CIA had spent millions helping train Jordan's intelligence service in exchange for information. Now Jordan has hired Blackwater to train its special forces. "Cofer can open doors," said Richer, who served 22 years at the CIA. "I can open doors. We can generally get in to see who we need to see. We ... can deal with the right minister or person." "They have the skills and background to do anything anyone wants," said RJ Hillhouse, who writes a national security blog called The Spy Who Billed Me. "There's no oversight. They're an independent company offering freelance espionage services. They're rent-a-spies."

David Frost: Does anyone know exactly who was responsible for this assassination attempt? There is one report that said that you arranged to send President Musharraf a letter ... in the event of your death by assassination, urging him to investigate certain individuals in his government. Is that true? Benazir Bhutto: Yes it is true that I wrote to General Musharraf. I feel these are the forces that really want to stop not just me, but the democratic process and the will of the people [from] triumphing. David Frost: In terms of these three people you mentioned where they members of or associated with the government? Benazir Bhutto: One of them is a very key figure in security. He is a former military officer. He is someone who has had dealings with Jaish-e-Mohammad, one of the band [of] groups of Maulana Masood Azhar, who was in an Indian jail for decapitating three British tourists and three American tourists. And he also had dealings with Omar Shiekh, who murdered Osama bin Laden.

Note: The key statement on bin Laden's murder happens at minute five in the video at the above link. If the link fails, click here. For a Jan. 9, 2010 BBC article also suggesting bin Laden may already have been dead years earlier and that his death had been covered up, click here. Bhutto was assassinated not long after this interview on Dec. 27, 2007.

[Las Vegas], famous for being America's playground, has also become its security lab. Like nowhere else in the United States, Las Vegas has embraced the twin trends of data mining and high-tech surveillance, with arguably more cameras per square foot than any airport or sports arena in the country. Even the city's cabs and monorail have cameras. Some privacy advocates view the city as a harbinger of things to come. In secret rooms in casinos across Las Vegas, surveillance specialists are busy analyzing information about players and employees. Relying on thousands of cameras in nearly every cranny of the casinos, they evaluate ... behavior. They ping names against databases that share information with other casinos, sometimes using facial-recognition software to validate a match. And in the marketing suites, casino staffers track players' every wager, every win or loss, the better to target high-rollers for special treatment and low- and middle-rollers for promotions. "You could almost look at Vegas as the incubator of a whole host of surveillance technologies," said James X. Dempsey, policy director for the Center for Democracy and Technology. Those technologies, he said, have spread to other commercial venues: malls, stadiums, amusement parks. After Sept. 11, 2001, several airports tested facial-recognition software, with little success. But the government is continuing to invest in biometric technologies. "We often hear of the surveillance technology du jour, but what we're seeing now in America is a collection of surveillance technologies that work together," said Barry Steinhardt, the American Civil Liberties Union's technology and liberty project director. "It isn't just video surveillance or face recognition or license plate readers or RFID chips. It's that all these technologies are converging to create a surveillance society."

Note: For revealing major media reports of privacy risks and invasions, click here.

Over the past four years, the amount of money the State Department pays to private security and law enforcement contractors has soared to nearly $4 billion a year from $1 billion, ... but ... the department had added few new officials to oversee the contracts. Auditors and outside exerts say the results have been vast cost overruns, poor contract performance and, in some cases, violence that has so far gone unpunished. A vast majority of the money goes to companies like DynCorp International and Blackwater [Worldwide] to protect diplomats overseas, train foreign police forces and assist in drug eradication programs. There are only 17 contract compliance officers at the State Department’s management bureau overseeing spending of the billions of dollars on these programs, officials said. Two new reports have delivered harsh judgments about the State Department’s handling of the contracts, including the protective services contract that employs Blackwater guards whose involvement in a Sept. 16 shooting in Baghdad has raised questions about their role in guarding American diplomats in Iraq. The ballooning budget for outside contracts at the State Department is emblematic of a broader trend, contracting experts say.
The Bush administration has doubled the amount of government money going to all types of contractors to $400 billion, creating a new and thriving class of post-9/11 corporations carrying out delicate work for the government. But the number of government employees issuing, managing and auditing contracts has barely grown. “That’s a criticism that’s true of not just State but of almost every agency,” said Jody Freeman, an expert on administrative law at Harvard Law School.

Li Runsen, the powerful technology director of China’s ministry of public security, is best known for leading Project Golden Shield, China’s intensive effort to strengthen police control over the Internet. But last month Mr. Li took an additional title: director for China Security and Surveillance Technology, a fast-growing company that installs and sometimes operates surveillance systems for Chinese police agencies, jails and banks, among other customers. The company has just been approved for a listing on the New York Stock Exchange. The company’s listing and Mr. Li’s membership on its board are just the latest signs of ever-closer ties among Wall Street, surveillance companies and the Chinese government’s security apparatus. Wall Street analysts now follow the growth of companies that install surveillance systems providing Chinese police stations with 24-hour video feeds from nearby Internet cafes. Hedge fund money from the United States has paid for the development of not just better video cameras, but face-recognition software and even newer behavior-recognition software designed to spot the beginnings of a street protest and notify police. Executives of Chinese surveillance companies say they are helping their government reduce street crime, preserve social stability and prevent terrorism. They note that London has a more sophisticated surveillance system, although the Chinese system will soon be far more extensive. Wall Street executives also defend the industry as necessary to keep the peace at a time of rapid change in China. They point out that New York has begun experimenting with surveillance cameras in Lower Manhattan and other areas of the city.

Traditionally, powerful spy satellites have been used to search for strategic threats overseas. But now the Department of Homeland Security has developed a new office to use the satellites to [monitor the US itself]. [DHS] officials ... faced extensive criticism [in Congress] about the privacy and civil liberty concerns of the new office, called the National Applications Office. [House Homeland Security] Committee members expressed concern about abuse of the satellite imagery, charging that Homeland Security had not informed the oversight committee about the program. "What's most disturbing is learning about it from The Wall Street Journal," said Committee Chairman Rep. Bennie Thompson, D-Miss. The lawmakers also expressed concern about using military capabilities for U.S. law enforcement and Homeland Security operations, potentially a violation of the Posse Comitatus Act, which bars the military from serving as a law enforcement body within the United States. Committee members said that in addition to not being informed about the National Applications Office program, they had not yet been provided with documents defining the limits and legal guidance about the program. [They] sent a letter to Homeland Security saying, "We are so concerned that ... we are calling for a moratorium on the program. Today's testimony made clear that there is effectively no legal framework governing the domestic use of satellite imagery for the various purposes envisioned by the department."

Broad new surveillance powers approved by Congress this month could allow the Bush administration to conduct spy operations that go well beyond wiretapping to include — without court approval — certain types of physical searches on American soil and the collection of Americans’ business records. “This may give the administration even more authority than people thought,” said David Kris, a former senior Justice Department lawyer in the Bush and Clinton administrations. Several legal experts said that by redefining the meaning of “electronic surveillance,” the new law narrows the types of communications covered in the Foreign Intelligence Surveillance Act, known as FISA, by indirectly giving the government the power to use intelligence collection methods far beyond wiretapping that previously required court approval if conducted inside the United States. These new powers include the collection of business records, physical searches and so-called “trap and trace” operations, analyzing specific calling patterns. For instance, the legislation would allow the government, under certain circumstances, to demand the business records of an American in Chicago without a warrant if it asserts that the search concerns its surveillance of a person who is in Paris, experts said. Some civil rights advocates said they suspected that the administration made the language of the bill intentionally vague to allow it even broader discretion over wiretapping decisions. The end result ... is that the legislation may grant the government the right to collect a range of information on American citizens inside the United States without warrants, as long as the administration asserts that the spying concerns the monitoring of a person believed to be overseas.

The Bush administration has approved a plan to expand domestic access to some of the most powerful tools of 21st-century spycraft, giving law enforcement officials and others the ability to view data obtained from satellite and aircraft sensors that can see through cloud cover and even penetrate buildings and underground bunkers. A program approved by the Office of the Director of National Intelligence and the Department of Homeland Security will allow broader domestic use of secret overhead imagery beginning as early as this fall, with the expectation that state and local law enforcement officials will eventually be able to tap into technology once largely restricted to foreign surveillance. But the program ... quickly provoked opposition from civil liberties advocates, who said the government is crossing a well-established line against the use of military assets in domestic law enforcement.
The administration's decision would provide domestic authorities with unprecedented access to high-resolution, real-time satellite photos. They could also have access to much more. Civil liberties groups quickly condemned the move, which Kate Martin, director of the Center for National Security Studies, ... likened to "Big Brother in the sky. They want to turn these enormous spy capabilities ... onto Americans. They are laying the bricks one at a time for a police state." Steven Aftergood, director of the Project on Government Secrecy for the Federation of American Scientists, said that ... oversight for the program was woefully inadequate. Enhanced access "shouldn't be adopted at all costs because it comes with risk to privacy and to the integrity of our political institutions," he said.

At least 20,000 police surveillance cameras are being installed along streets here [in Shenzhen] in southern China and will soon be guided by sophisticated computer software from an American-financed company to recognize automatically the faces of police suspects and detect unusual activity. Starting this month in a port neighborhood and then spreading across Shenzhen, a city of 12.4 million people, residency cards fitted with powerful computer chips programmed by the same company will be issued to most citizens.
Data on the chip will include not just the citizen’s name and address but also work history, educational background, religion, ethnicity, police record, medical insurance status and landlord’s phone number. Even personal reproductive history will be included, for enforcement of China’s controversial “one child” policy. Plans are being studied to add credit histories, subway travel payments and small purchases charged to the card. Security experts describe China’s plans as the world’s largest effort to meld cutting-edge computer technology with police work to track the activities of a population. But they say the technology can be used to violate civil rights. “We have a very good relationship with U.S. companies like I.B.M., Cisco, H.P., Dell,” said Robin Huang, the chief operating officer of China Public Security. “All of these U.S. companies work with us to build our system together.” The role of American companies in helping Chinese security forces has periodically been controversial in the United States. Executives from Yahoo, Google, Microsoft and Cisco Systems testified in February 2006 at a Congressional hearing called to review whether they had deliberately designed their systems to help the Chinese state muzzle dissidents on the Internet; they denied having done so.

The Department of Homeland Security is funneling millions of dollars to local governments nationwide for purchasing high-tech video camera networks, accelerating the rise of a "surveillance society" in which the sense of freedom that stems from being anonymous in public will be lost, privacy rights advocates warn. The department ... has doled out millions on surveillance cameras, transforming city streets and parks into places under constant observation. A Globe [investigation] shows that a large number of new surveillance systems, costing at least tens and probably hundreds of millions of dollars, are being simultaneously installed around the country as part of homeland security grants. Federal money is helping New York, Baltimore, and Chicago build massive surveillance systems that may also link thousands of privately owned security cameras. Boston has installed about 500 cameras in the MBTA system, funded in part with homeland security funds. Marc Rotenberg, director of the Electronic Privacy Information Center, said [the] Homeland Security Department is the primary driver in spreading surveillance cameras, making their adoption more attractive by offering federal money to city and state leaders. The proliferation of cameras could mean that Americans will feel less free because legal public behavior -- attending a political rally, entering a doctor's office, or even joking with friends in a park -- will leave a permanent record, retrievable by authorities at any time.

The Bush administration plans to leave oversight of its expanded foreign eavesdropping program to the same government officials who supervise the surveillance activities and to the intelligence personnel who carry them out, senior government officials said yesterday. The law, which permits intercepting Americans' calls and e-mails without a warrant if the communications involve overseas transmission, gives Director of National Intelligence Mike McConnell and Attorney General Alberto R. Gonzales responsibility for creating the broad procedures determining whose telephone calls and e-mails are collected. It also gives McConnell and Gonzales the role of assessing compliance with those procedures. The law ... does not contain provisions for outside oversight -- unlike an earlier House measure that called for audits every 60 days by the Justice Department's inspector general. The controversial changes to the 1978 Foreign Intelligence Surveillance Act were approved by both chambers of the Democratic-controlled Congress despite privacy concerns raised by Democratic leaders and civil liberties advocacy groups. Central to the new program is the collection of foreign intelligence from "communication service providers," which the officials declined to identify, citing secrecy concerns. Under the new law, the attorney general is required to draw up the governing procedures for surveillance activity, for approval by the Foreign Intelligence Surveillance Court. Once the procedures are established, the attorney general and director of national intelligence will formally certify that the collection of data is authorized. But the certification will be placed under seal "unless the certification is necessary to determine the legality of the acquisition," according to the law signed by Bush.

The Bush administration rushed to defend new espionage legislation Monday amid growing concern that the changes could lead to increased spying by U.S. intelligence agencies on American citizens. But officials declined to provide details about how the new capabilities might be used by the National Security Agency and other spy services. And in many cases, they could point only to internal monitoring mechanisms to prevent abuse of the new rules that appear to give the government greater authority to tap into the traffic flowing across U.S. telecommunications networks. Officials rejected assertions that the new capabilities would enable the government to cast electronic "drift nets" that might ensnare U.S. citizens [and] that the new legislation would amount to the expansion of a controversial — and critics contend unconstitutional — warrantless wiretapping program that President Bush authorized after the 9/11 attacks. Intelligence experts said there were an array of provisions in the new legislation that appeared to make it possible for the government to engage in intelligence-collection activities that the Bush administration officials were discounting. "They are trying to shift the terms of the debate to their intentions and away from the meaning of the new law," said Steven Aftergood, an intelligence policy analyst at the Federation of American Scientists. "The new law gives them authority to do far more than simply surveil foreign communications abroad," he said. "It expands the surveillance program beyond terrorism to encompass foreign intelligence. It permits the monitoring of communications of a U.S. person as long as he or she is not the primary target. And it effectively removes judicial supervision of the surveillance process."

It was appalling to watch over the last few days as Congress — now led by Democrats — caved in to yet another unnecessary and dangerous expansion of President Bush’s powers, this time to spy on Americans in violation of basic constitutional rights. Many of the 16 Democrats in the Senate and 41 in the House who voted for the bill said that they had acted in the name of national security, but the only security at play was their job security. What [do] the Democrats ... plan to do with their majority in Congress if they are too scared of Republican campaign ads to use it to protect the Constitution and restrain an out-of-control president[?] The White House and its allies on Capitol Hill railroaded Congress into voting a vast expansion of the president’s powers. They gave the director of national intelligence and the attorney general authority to intercept — without warrant, court supervision or accountability — any telephone call or e-mail message that moves in, out of or through the United States as long as there is a “reasonable belief” that one party is not in the United States. While serving little purpose, the new law has real dangers. It would allow the government to intercept, without a warrant, every communication into or out of any country, including the United States. The Democratic majority has made strides on other issues like children’s health insurance against White House opposition. As important as these measures are, they do not excuse the Democrats from remedying the damage Mr. Bush has done to civil liberties and the Bill of Rights. That is their most important duty.

President Bush signed into law ... legislation that broadly [expands] the government’s authority to eavesdrop on the international telephone calls and e-mail messages of American citizens without warrants. The law [goes] far beyond the small fixes that administration officials had said were needed to gather information about foreign terrorists [and will] sharply alter the legal limits on the government’s ability to monitor millions of phone calls and e-mail messages going in and out of the United States. The new law for the first time [provides] a legal framework for much of the surveillance without warrants that was being conducted in secret by the National Security Agency and outside the Foreign Intelligence Surveillance Act, the 1978 law that is supposed to regulate the way the government can listen to the private communications of American citizens. “This more or less legalizes the N.S.A. program,” said Kate Martin, director of the Center for National Security Studies in Washington. Previously, the government needed search warrants approved by a special intelligence court to eavesdrop on ... electronic communications between individuals inside the United States and people overseas. The new law gives the attorney general and the director of national intelligence the power to approve the international surveillance, rather than the special intelligence court. The law also gave the administration greater power to force telecommunications companies to cooperate with such spying operations. The companies can now be compelled to cooperate by orders from the attorney general and the director of national intelligence.

President Bush's latest affront to the U.S. Constitution [is] in plain view on the White House Web site: "Executive Order: Blocking Property of Certain Persons Who Threaten Stabilization Efforts in Iraq." This far-reaching order ... is a frontal assault on the Fifth Amendment, which decrees that the government cannot seize an individual's property without due process. [The order asserts] the authority to freeze the American assets of anyone who directly or indirectly assists someone who poses "a significant risk" [to] the "peace and stability" of [Iraq] or the reconstruction effort. "On its face, this is the greatest encroachment on civil liberties since the internment of Japanese Americans in World War II," said Bruce Fein, a constitutional lawyer who was a deputy attorney general in the Reagan administration. Fein said the sanctions against suspected violators would amount to "a financial death penalty. King George III really would have been jealous of this power." The executive order not only calls for the freezing of assets of anyone who directly or indirectly [opposes US policy in Iraq,] it prohibits anyone else from providing "funds, goods or services" to a blacklisted individual. In other words, a friend or relative could have his or her assets seized for trying to help someone whose bank account is suddenly frozen. An attorney who offered legal help could risk losing everything he or she owned. Then again, there's not much need for lawyers in the world of this executive order. The blacklist would be drawn up by the "secretary of treasury, in consultation with the secretary of state and the secretary of defense." The Fifth Amendment was written for good reason: It's dangerous to give the government unchecked authority to seize private property without judicial review.

[BBC Radio] uncovers details of a planned coup in the USA in 1933 by right-wing American businessmen. The coup was aimed at toppling President Franklin D Roosevelt with the help of half-a-million war veterans. The plotters, who were alleged to involve some of the most famous families in America (owners of Heinz, Birds Eye, Goodtea, Maxwell [House] and George Bush’s grandfather, Prescott [Bush]) believed that their country should adopt the policies of Hitler and Mussolini to beat the great depression. Why [is] so little ... known about this biggest ever peacetime threat to American democracy?

Note: The highly decorated General Smedley Butler, author of the landmark book War is a Racket, was approached by the plotters for assistance in carrying out this coup. He at first played along, but then eventually exposed the coup plot in Congressional testimony. Yet news of this huge plot was squelched by both the government and media. To understand why, read a two-page summary of General Butler's book by clicking here and listen to the gripping, 30-minute BBC broadcast at the link above.

CityWatcher.com, a provider of surveillance equipment, attracted little notice itself until a year ago, when two of its employees had glass-encapsulated microchips with miniature antennas embedded in their forearms. The "chipping" of two workers with RFIDs radio frequency identification tags ... was merely a way of restricting access to ... sensitive data and images ... the company said. Innocuous? Maybe. But the news that Americans had, for the first time, been injected with electronic identifiers to perform their jobs fired up a debate over the proliferation of ever-more-precise tracking technologies and their ability to erode privacy in the digital age. To some, the ... notion of tagging people was Orwellian. Chipping, these critics said, might start with Alzheimer's patients or Army Rangers, but would eventually be suggested for convicts, then parolees, then sex offenders, then illegal aliens until one day, a majority of Americans, falling into one category or another, would find themselves electronically tagged. "It was scary that a government contractor that specialized in putting surveillance cameras on city streets was the first to incorporate this technology in the workplace," says Liz McIntyre, co-author of Spychips: How Major Corporations and Government Plan to Track Your Every Move with RFID. Within days of the company's announcement, civil libertarians and Christian conservatives joined to excoriate the microchip's implantation in people.

Note: For educated speculation on how certain powerful people might like to have everyone implanted with microchips for security and control purposes, click here.

The Federal Bureau of Investigation is developing a computer-profiling system that would enable investigators to target possible terror suspects. The System to Assess Risk, or STAR, assigns risk scores to possible suspects based on a variety of information, similar to the way a credit bureau assigns a rating based on a consumer's spending behavior and debt. The program focuses on foreign suspects but also includes data about some U.S. residents. Some lawmakers said ... that the report raises new questions about the government's power to use personal information and intelligence without accountability. "The Bush administration has expanded the use of this technology, often in secret, to collect and sift through Americans' most sensitive personal information," said Sen. Patrick J. Leahy (D-Vt.), chairman of the Senate Judiciary Committee. The use of data mining in the war on terror has sparked criticism. An airplane-passenger screening program called CAPPS II was revamped and renamed because of civil liberty concerns. An effort to collect Americans' personal and financial data called Total Information Awareness was killed. Law enforcement and national security officials have continued working on other programs to use computers to sift through information for signs of threats. The Department of Homeland Security, for example, flags travelers entering and leaving the United States who may be potential suspects through a risk-assessment program called the Automated Targeting System.

FBI Would Skirt the Law With Proposed Phone Record Program, Experts Say

A proposed new FBI program would skirt federal laws by paying private companies to hold millions of phone and Internet records which the bureau is barred from keeping itself, experts say. The $5 million project would apparently pay private firms to store at least two years' worth of telephone and Internet activity by millions of Americans, few of whom would ever be considered a suspect in any terrorism, intelligence or criminal matter. The FBI is barred by law from collecting and storing such data if it has no connection to a specific investigation or intelligence matter. In recent years the bureau has tried to encourage telecommunications firms to voluntarily store such information, but corporations have balked at the cost of keeping records they don't need. "The government isn't allowed to warehouse the information, and the companies don't want to, so this creates a business incentive for the companies to warehouse it, so the government can access it later," said Mike German, a policy expert on national security and privacy issues for the American Civil Liberties Union (ACLU). "It's a public-private partnership that puts civil liberties to the test." In March, an FBI official identified the companies as Verizon, MCI and AT&T. Even the bureau's own top lawyer said she found the [FBI's] behavior "disturbing," noting that when requesting access to phone company records, it repeatedly referenced "emergency" situations that did not exist, falsely claimed grand juries had subpoenaed information and failed to keep records on much of its own activity.

Federal agents do not need a search warrant to monitor a suspect's computer use and determine the e-mail addresses and Web pages the suspect is contacting, a federal appeals court ruled Friday. In a drug case from San Diego County, the Ninth U.S. Circuit Court of Appeals in San Francisco likened computer surveillance to the "pen register" devices that officers use to pinpoint the phone numbers a suspect dials, without listening to the phone calls themselves. In Friday's ruling, the court said computer users should know that they lose privacy protections with e-mail and Web site addresses when they are communicated to the company whose equipment carries the messages. The search is no more intrusive than officers' examination of a list of phone numbers or the outside of a mailed package, neither of which requires a warrant, Judge Raymond Fisher said in the 3-0 ruling. Defense lawyer Michael Crowley disagreed. His client, Dennis Alba, was sentenced to 30 years in prison after being convicted of operating a laboratory in Escondido that manufactured the drug ecstasy. Some of the evidence against Alba came from agents' tracking of his computer use. The court upheld his conviction and sentence. Expert evidence in Alba's case showed that the Web addresses obtained by federal agents included page numbers that allowed the agents to determine what someone read online, Crowley said. The ruling "further erodes our privacy," the attorney said. "The great political marketplace of ideas is the Internet, and the government has unbridled access to it."

Note: So now every email you send and read can be monitored legally. Why didn't this make news headlines?

Long-secret documents released Tuesday provide new details about how the Central Intelligence Agency illegally spied on Americans decades ago. Known inside the agency as the “family jewels,” the 702 pages of documents released Tuesday catalog domestic wiretapping operations, failed assassination plots, mind-control experiments and spying on journalists from the early years of the C.I.A. The papers provide evidence of paranoia and occasional incompetence as the agency began a string of illegal spying operations in the 1960s and 1970s, often to hunt links between Communist governments and the domestic protests that roiled the nation in that period. Yet the long-awaited documents leave out a great deal. Large sections are censored, showing that the C.I.A. still cannot bring itself to expose all the skeletons in its closet. And many activities about overseas operations disclosed years ago by journalists, Congressional investigators and a presidential commission — which led to reforms of the nation’s intelligence agencies — are not detailed in the papers. The 60-year-old agency has been under fire ... by critics [of] the secret prisons and harsh interrogation practices it has adopted since the Sept. 11 attacks. Some intelligence experts suggested ... that the release of the documents was intended to distract from the current controversies. And they and historians expressed disappointment that the documents were so heavily censored. Tom Blanton of the National Security Archive, the research group that filed the Freedom of Information request in 1992 that led to the documents’ becoming public, said he was initially underwhelmed by them because they contained little about the agency’s foreign operations. But Mr. Blanton said what was striking was the scope of the C.I.A’s domestic spying efforts.

Note: The entire body of the CIA's "Family Jewels" documents have been posted online by the National Security Archives, and can be read by clicking here.

The U.S. Northern Command, the military command responsible for "homeland defense," has asked the Pentagon if it can establish its own special operations command for domestic missions. The request ... would establish a permanent sub-command for responses to incidents of domestic terrorism as well as other occasions where special operators may be necessary on American soil. The establishment of a domestic special operations mission, and the preparation of contingency plans to employ commandos in the United States, would upend decades of tradition. Military actions within the United States are the responsibility of state militias (the National Guard), and federal law enforcement is a function of the FBI. Employing special operations for domestic missions sounds very ominous, and NORTHCOM's request earlier this year should receive the closest possible Pentagon and congressional scrutiny. There's only one problem: NORTHCOM is already doing what it has requested permission to do. When NORTHCOM was established after 9/11 to be the military counterpart to the Department of Homeland Security, within its headquarters staff it established a Compartmented Planning and Operations Cell (CPOC) responsible for planning and directing a set of "compartmented" and "sensitive" operations on U.S., Canadian and Mexican soil. In other words, these are the very special operations that NORTHCOM is now formally asking the Pentagon to beef up into a public and acknowledged sub-command.

The CIA will declassify hundreds of pages of long-secret records detailing some of the intelligence agency's worst illegal abuses -- the so-called "family jewels" documenting a quarter-century of overseas assassination attempts, domestic spying, kidnapping and infiltration of leftist groups ... CIA Director Michael V. Hayden said yesterday. The documents ... also include accounts of break-ins and theft, the agency's opening of private mail to and from China and the Soviet Union, wiretaps and surveillance of journalists, and a series of "unwitting" tests on U.S. civilians, including the use of drugs. The documents have been sought for decades by historians, journalists and conspiracy theorists and have been the subject of many fruitless Freedom of Information Act requests. In anticipation of the CIA's release, the National Security Archive at George Washington University yesterday published a separate set of documents from January 1975 detailing internal government discussions of the abuses. Those documents portray a rising sense of panic within the administration of President Gerald R. Ford that what then-CIA Director William E. Colby called "skeletons" in the CIA's closet had begun to be revealed in news accounts. "It's surely part of [Hayden's] program now to draw a bright line with the past," said National Security Archive Director Thomas S. Blanton. "But it's uncanny how the government keeps dipping into the black bag." Newly revealed details of ancient CIA operations, Blanton said, "are pretty resonant today."

William E. Colby faced an uneasy decision in late 1973 when he took over the Central Intelligence Agency: whether to make public the agency’s internal accounting, then being compiled, of its domestic spying, assassination plots and other misdeeds since its founding nearly three decades earlier. Mr. Colby decided to keep the so-called family jewels a secret, and wrote in his memoir in 1978 that he believed the agency’s already sullied reputation ... could not have withstood a public airing of all its dirty laundry. So why, at a time when the agency has again been besieged by criticism, this time for its program of secret detentions and interrogations since the Sept. 11 attacks, would the current director, Gen. Michael V. Hayden, decide to declassify the same documents that Mr. Colby chose to keep secret? General Hayden said it was essential for the C.I.A. ... to be as open as possible in order to build public trust and dispel myths surrounding its operations. The more that the agency can tell the public, he said, the less chance that misinformation among the public will “fill the vacuum.” It was this outlook that General Hayden, whose public relations skills are well known in Washington, brought to an earlier job. There, as director of the National Security Agency, he tried to overhaul the N.S.A.’s public image — that of the shadowy, menacing organization portrayed in the movie “Enemy of the State” — by inviting reporters to briefings and authorizing its officials to speak to the author James Bamford for his book on the agency, “Body of Secrets.”

Note: For a brief summary of and links to further information about James Bamford's important book on the NSA, Body of Secrets, click here.

An internal FBI audit has found that the bureau potentially violated the law or agency rules more than 1,000 times while collecting data about domestic phone calls, e-mails and financial transactions in recent years, far more than was documented in a Justice Department report in March that ignited bipartisan congressional criticism. The new audit covers just 10 percent of the bureau's national security investigations since 2002. The vast majority of the new violations were instances in which telephone companies and Internet providers gave agents phone and e-mail records the agents did not request and were not authorized to collect. The agents retained the information anyway in their files. Two dozen of the newly-discovered violations involved agents' requests for information that U.S. law did not allow them to have. The results confirmed what ... critics feared, namely that many agents did not ... follow the required legal procedures and paperwork requirements when collecting personal information with one of the most sensitive and powerful intelligence-gathering tools of the post-Sept. 11 era -- the National Security Letter, or NSL. Such letters are uniformly secret and amount to nonnegotiable demands for personal information -- demands that are not reviewed in advance by a judge. After the 2001 terrorist attacks, Congress substantially eased the rules for issuing NSLs, [leading] to an explosive growth in the use of the letters. More than 19,000 such letters were issued in 2005 seeking 47,000 pieces of information, mostly from telecommunications companies.

A terrorist watch list compiled by the FBI has apparently swelled to include more than half a million names. Privacy and civil liberties advocates say the list is growing uncontrollably, threatening its usefulness in the war on terror. The bureau says the number of names on its terrorist watch list is classified. A portion of the FBI's unclassified 2008 budget request posted to the Department of Justice Web site, however, refers to "the entire watch list of 509,000 names." A spokesman for the interagency National Counterterrorism Center (NCTC), which maintains the government's list of all suspected terrorists with links to international organizations, said they had 465,000 names covering 350,000 individuals. Many names are different versions of the same identity. In addition to the NCTC list, the FBI keeps a list of U.S. persons who are believed to be domestic terrorists - abortion clinic bombers, for example, or firebombing environmental extremists, who have no known tie to an international terrorist group. Combined, the NCTC and FBI compendia comprise the watch list used by federal security screening personnel on the lookout for terrorists. While the NCTC has made no secret of its terrorist tally, the FBI has consistently declined to tell the public how many names are on its list. "It grows seemingly without control or limitation," said ACLU senior legislative counsel Tim Sparapani of the terrorism watch list. Sparapani called the 509,000 figure "stunning. If we have 509,000 names on that list, the watch list is virtually useless," he told ABC News. "You'll be capturing innocent individuals with no connection to crime or terror." U.S. lawmakers and their spouses have been detained because their names were on the watch list.

The Bush administration is writing a new plan to maintain governmental control in the wake of an apocalyptic terrorist attack or overwhelming natural disaster, moving such doomsday planning for the first time from the Federal Emergency Management Agency to officials inside the White House. Discussion among legal specialists, homeland security experts and Internet commentators [includes] concerns that the policy may [make] it too easy to invoke emergency presidential powers such as martial law. The ... new "National Continuity Policy" contains few details about how surviving officials would invoke emergency powers, or when emergency powers should be deemed to be no longer necessary. The unanswered questions have provoked anxiety across ideological lines. The conservative commentator Jerome Corsi [wrote] that the directive looked like a recipe for allowing the office of the presidency to seize "dictatorial powers" because the policy does not discuss consulting Congress about when to invoke emergency powers -- or when to turn them off. Some specialists say that the White House should be more specific about its worst-case scenario plans, pointing out two unanswered questions: what circumstances would trigger implementation of the plan and what legal limits the White House recognizes on its own emergency powers. The policy ... does not contain a direct reference to statutes in which Congress has imposed checks and balances on the president's power to impose martial law or other extraordinary measures, [nor does it] explicitly acknowledge the National Emergencies Act, [a] law that gives Congress the right to override the president's determination that a national emergency still exists.

Claims of 9/11 conspiracy have suspect running scared

2007-05-25, Rocky Mountain News (One of Denver's two leading newspapers)

A former Federal Emergency Management Agency videographer accused of killing his wife in Denver is seeking political asylum in Argentina, claiming the U.S. government wants him silenced for what he saw in the smoldering ruins of the Twin Towers after 9/11. Kurt Sonnenfeld's efforts to avoid extradition have gained interest from human rights organizations in South America and broad attention from conspiracy theorists on the Internet. Sonnenfeld, 44, is charged with first-degree murder in the New Year's Day 2002 shooting death of his 36-year-old wife, Nancy. Sonnenfeld is quoted by the Argentine newspaper el Pais as saying, "I realized that they were after something else: the tapes of Ground Zero in my possession." Sonnenfeld said he was arrested by Interpol agents on the new Denver charges a week after delivering a demo video of 9/11 footage to a TV producer in Argentina. "I find that extremely coincidental," he said. In other interviews with Argentine media, Sonnenfeld is quoted as saying, "What I saw (at 9/11) leads me to the terrible conclusion that there was foreknowledge of what was going to happen — the precautions that were taken to save certain things that the authorities there considered irreplaceable or invaluable. For example, certain things were missing that could only have been removed with a truck. Yet after the first plane hit one of the towers, everything in Manhattan collapsed and no one could have gotten near the towers to do that." Sonnenfeld is quoted as saying documentation was removed from U.S. intelligence agencies in the World Trade Center, including the CIA, prior to the attacks.

Note: To read a more recent, powerful Voltaire Network interview with Kurt Sonnenfeld, click here. The truth is coming out more all the time!

Senior government and military officials and other experts, organized by a joint Stanford-Harvard program called the Preventive Defense Project, met behind closed doors in Washington for a day-long workshop called "The Day After." The organizers of the nonpartisan project, Stanford's William Perry, a secretary of defense in the Clinton administration, and Harvard's Ashton Carter, a senior Defense Department official during the Clinton years, assumed the detonation of a bomb similar in size to the weapon that destroyed Hiroshima in World War II. A paper [they] are writing ... urges local governments and individuals to build underground bomb shelters; encourages authorities who survive to prevent evacuation of at least some of the areas attacked for three days ... and proposes suspending regulations on radiation exposure so that first responders would be able to act, even if that caused higher cancer rates. "The public at large will expect that their government had thought through this possibility and to have planned for it," Carter said in an interview. "This kind of an event would be unprecedented. We have had glimpses of something like this with Hiroshima, and glimpses with 9/11 and with Katrina. But those are only glimpses. If one bomb goes off, there are likely to be more to follow," Carter said. "This fact, that nuclear terrorism will appear as a syndrome rather than a single episode, has major consequences." It would, he added, require powerful government intervention to force people to do something many may resist -- staying put.

Note: Ashton Carter was co-author, with Philip Zelikow (later Executive Director of the 9/11 Commission) and John Deutch (former CIA Director), of a 1998 Foreign Affairs article, "Catastrophic Terrorism: Tackling the New Danger," which warned of a possible catastrophic attack on the World Trade Center and accurately described the governmental aftermath of 9/11.

The Pentagon has placed unprecedented restrictions on who can testify before Congress, reserving the right to bar lower-ranking officers, enlisted soldiers, and career bureaucrats from appearing before oversight committees or having their remarks transcribed. The guidelines, described in an April 19 memo to the staff director of the House Armed Services Committee, adds that all field-level officers and enlisted personnel must be "deemed appropriate" by the Department of Defense before they can participate in personal briefings for members of Congress or their staffs. In addition, according to the memo, the proceedings must not be recorded. Any officers who are allowed to testify must be accompanied by an official from the administration. Veterans of the legislative process -- who say they have never heard of such guidelines before -- maintain that the Pentagon has no authority to set such ground rules. A Pentagon spokesman confirmed that the guidelines are new. The memo has fueled complaints that the Bush administration is trying to restrict access to information about the war in Iraq. [A] special House oversight panel, according to aides, has written at least 10 letters to the Pentagon since February seeking information and has received only one official reply. Nor has the Pentagon fully complied with repeated requests for all the monthly assessments of Iraqi security forces.

Note: When the military begins to control the legislative, democracy begins to shift towards dictatorship. And for reliable information how the Pentagon cannot account for hundreds of billions of dollars, click here.

President Bush issued a formal national security directive yesterday ordering agencies to prepare contingency plans for a surprise, "decapitating" attack on the federal government, and assigned responsibility for coordinating such plans to the White House. The prospect of a nuclear bomb being detonated in Washington without warning ... has been cited by many security analysts as a rising concern since the Sept. 11, 2001, attacks. The order makes explicit that the focus of federal worst-case planning involves a covert nuclear attack against the nation's capital. "Adequate warning of potential emergencies that could pose a significant risk to the homeland might not be available, and therefore all continuity planning shall be based on the assumption that no such warning will be received," states the 72-paragraph order. The statement added, "Emphasis will be placed upon geographic dispersion of leadership, staff, and infrastructure in order to increase survivability and maintain uninterrupted Government Functions." After the 2001 attacks, Bush assigned about 100 senior civilian managers to rotate secretly to locations outside of Washington for weeks or months at a time [forming] a shadow government that evolved based on long-standing "continuity of operations plans." Since then, other agencies including the Pentagon, the Office of the Director of National Intelligence and the CIA have taken steps to relocate facilities or key functions outside of Washington for their own reasons, citing factors such as economics or the importance of avoiding Beltway "group-think."

Note: Why isn't Congress making these absolutely vital decisions? What gives these organizations authority to determine what will happen in the case of a major attack?

Millions of us are engaging in one of life's least-enjoyable activities. We're doing our taxes. We can thank the 16th Amendment for all this unpleasantness. Much maligned, much misunderstood, this amendment, ratified in February 1913, permits Congress to "lay and collect taxes on incomes from whatever source derived." Proposed by a Republican president, William Howard Taft, but commonly blamed on -- or credited to -- his Democratic successor, Woodrow Wilson, it was promptly denounced by unhappy members of both parties. Only in 1862 did Congress, facing Civil War expenses, impose a federal income tax. There were two marvelous things about this Civil War income tax. One was that you declared your own income. The second was that it was abolished after 10 years. The main reason this Civil War income tax disappeared was not that the government felt it no longer needed the money (alas, this is never true). The tax was lifted because wealthy Northeast manufacturers, the war's major taxpayers, possessed the congressional clout to replace income taxes with protective tariffs that shielded their manufactured goods. In 1894, [a] new income tax became law, only to be declared unconstitutional one year later. When the 16th Amendment was first put into practice, it would indeed be the "rich man's tax," both sides predicted. With generous deductions and a $3,000 exemption (about $55,000 today), most people didn't feel a thing. Best of all, the instructions were only one page long. Soon, of course, all this changed, in ways that nobody, pro-tax or con, could have foreseen.

Note: Many are unaware that the U.S. functioned without income tax for much of its history. The public never would have supported the 16th Amendment in 1913 if they thought it would tax the common worker. Were we duped? The 16th Amendment coincidentally was passed in the same year that the Federal Reserve (which took over the printing of U.S. money) was established. Few know that the Federal Reserve is neither truly federal or a full reserve. For more on this very well hidden fact and other cover-ups around banking, click here.

Behind the county hospital's tall cinderblock walls, a 27-year-old tuberculosis patient ... sits in a jail cell equipped with a ventilation system that keeps germs from escaping. Robert Daniels has been locked up indefinitely, perhaps for the rest of his life, since last July. But he has not been charged with a crime. Instead, he suffers from an extensively drug-resistant strain of tuberculosis. It is considered virtually untreatable. County health authorities obtained a court order to lock him up as a danger to the public because ... he did not heed doctors' instructions to wear a mask in public. "I'm being treated worse than an inmate," Daniels said. "I'm all alone. Four walls. Even the door to my room has been locked. I haven't seen my reflection in months." He said sheriff's deputies will not let him take a shower -- he cleans himself with wet wipes -- and have taken away his television, radio, personal phone and computer. His only visitors are masked medical staff members who come in to give him his medication. Though Daniels' confinement is extremely rare, health experts say it is a situation that U.S. public health officials may have to confront more and more because of the spread of drug-resistant TB and the emergence of diseases such as SARS and avian flu.

Note: If the above link fails, click here. What possible reason is there for taking away this man's TV, radio, cell phone, and computer? Are we being prepared for mass quarantines and imprisonment due to disease? For more, click here.

A secret FBI intelligence unit helped detain a group of war protesters in a downtown Washington parking garage in April 2002 and interrogated some of them on videotape about their political and religious beliefs. [Washington] D.C. police said authorities only recently found the logs of police responses to that day's events. That discovery came after three years of police assurances in federal court that no such records or logs existed showing the FBI's role. The FBI and D.C. police said they had no records of such an incident. And police told a federal court that no FBI agents were present when officers arrested more than 20 protesters that afternoon for trespassing; police viewed them as suspicious for milling around the parking garage entrance. Similar intelligence-gathering operations have been reported in New York, where a local police intelligence unit tried to infiltrate groups planning to protest at the Republican National Convention in 2004, and in Colorado, where records surfaced showing that the FBI collected names and license plates of people protesting timber industry practices at a 2002 industry convention.

In another sign that Japan is pressing ahead in revising its history of World War II, new high school textbooks will no longer acknowledge that the Imperial Army was responsible for a major atrocity in Okinawa, the government announced late Friday. The Ministry of Education ordered publishers to delete passages stating that the Imperial Army ordered civilians to commit mass suicide during the Battle of Okinawa, as the island was about to fall to American troops in the final months of the war. The decision was announced as part of the ministry’s annual screening of textbooks used in all public schools. The ministry also ordered changes to other delicate issues to dovetail with government assertions, though the screening is supposed to be free of political interference. The decision on the Battle of Okinawa ... came as a surprise because the ministry had never objected to the description in the past. The fresh denial of the military’s responsibility in the Battle of Okinawa and in sexual slavery — long accepted as historical facts — is likely to deepen suspicions in Asia that Tokyo is trying to whitewash its militarist past even as it tries to raise the profile of its current forces. The ministry’s new position appeared to discount overwhelming evidence of coercion, particularly the testimony of victims and survivors themselves.

Note: History many times is written -- or in this case re-written -- by those in power.

Our collective failure has been to take our political leaders at their word. This week the BBC reported that the government's own scientists advised ministers that the Johns Hopkins study on Iraq civilian mortality was accurate and reliable. Published in the Lancet ...it estimated that 650,000 Iraqi civilians had died since the American and British led invasion in March 2003. Immediately after publication, the prime minister's official spokesman said that the Lancet's study "was not one we believe to be anywhere near accurate". The foreign secretary ... said that the Lancet figures were "extrapolated" and a "leap". President Bush said: "I don't consider it a credible report". Scientists at the UK's Department for International Development thought differently. They concluded that the study's methods were "tried and tested". Indeed, the Johns Hopkins approach would likely lead to an "underestimation of mortality". The Ministry of Defence's chief scientific adviser ... recommended "caution in publicly criticising the study". When these recommendations went to the prime minister's advisers, they were horrified. Tony Blair was advised to say: "The overriding message is that there are no accurate or reliable figures of deaths in Iraq". At a time when we are celebrating our enlightened abolition of slavery 200 years ago, we are continuing to commit one of the worst international abuses of human rights of the past half-century. Two hundred years from now, the Iraq war will be mourned as the moment when Britain violated its delicate democratic constitution and joined the ranks of nations that use extreme pre-emptive killing as a tactic of foreign policy.

Note: This article is written by Richard Horton, the editor of the highly esteemed British medical journal Lancet.

With humanity coming up fast on 2012, publishers are helping readers gear up and count down to this mysterious — some even call it apocalyptic — date. Since November, at least three new books on 2012 have arrived in mainstream bookstores. Journalist Lawrence Joseph forecasts widespread catastrophe in Apocalypse 2012: A Scientific Investigation Into Civilization's End. Spiritual healer Andrew Smith predicts a restoration of a "true balance between Divine Feminine and Masculine" in The Revolution of 2012. In 2012, Daniel Pinchbeck anticipates a "change in the nature of consciousness." Each arrives in the wake of the 2006 success of 2012: The Return of Quetzalcoatl, which has been selling thousands of copies a month since its release in May. The books also build on popular interest in the Maya. Authors disagree about what humankind should expect on Dec. 21, 2012, when the Maya's "Long Count" calendar marks the end of a 5,126-year era. Maya civilization, known for advanced writing, mathematics and astronomy, flourished for centuries in Mesoamerica, especially between A.D. 300 and 900. Its Long Count calendar ... tracks more than 5,000 years, then resets at year zero. Publishers seem to be courting readers who believe humanity is creating its own ecological disasters and desperately needs ancient indigenous wisdom. Part of the 2012 mystique stems from the stars. On the winter solstice in 2012, the sun will be aligned with the center of the Milky Way for the first time in about 26,000 years. This means that "whatever energy typically streams to Earth from the center of the Milky Way will indeed be disrupted on 12/21/12 at 11:11 p.m. Universal Time," Joseph writes.

Note: There are many misconceptions spreading about 2012. Some say the Mayan calendar ends in 2012, when in fact the Mayan calendar never ends. The "alautun," for example is a Mayan unit of time measure equal to over 60 million years. The claim that the sun will align with the center of the Milky way is 2012 is also a misconception. Calculations of this date are not exact, with one expert giving a date of 1998 plus or minus 18 years. Many seem to want something big to happen in 2012, when perhaps the most important time on which to focus on is this moment, right now.

For at least a year before the 2004 Republican National Convention, teams of undercover New York City police officers traveled to cities across the country, Canada and Europe to conduct covert observations of people who planned to protest at the convention, according to police records and interviews. From Albuquerque to Montreal, San Francisco to Miami, undercover New York police officers attended meetings of political groups, posing as sympathizers or fellow activists. They made friends, shared meals, swapped e-mail messages and then filed daily reports with the department’s Intelligence Division. In hundreds of reports stamped “N.Y.P.D. Secret,” the Intelligence Division chronicled the views and plans of people who had no apparent intention of breaking the law. These included members of street theater companies, church groups and antiwar organizations. Three New York City elected officials were cited in the reports. In at least some cases, intelligence on what appeared to be lawful activity was shared with police departments in other cities. In addition to sharing information with other police departments, New York undercover officers were active themselves in at least 15 places outside New York — including California, Connecticut, Florida, Georgia, Illinois, Massachusetts, Michigan, Montreal, New Hampshire, New Mexico, Oregon, Tennessee, Texas and Washington, D.C. — and in Europe. To date, as the boundaries of the department’s expanded powers continue to be debated, police officials have provided only glimpses of its intelligence-gathering.

The Justice Department's inspector general revealed on March 9 that the FBI has been systematically abusing one of the most controversial provisions of the USA Patriot Act: the expanded power to issue "national security letters." It no doubt surprised most Americans to learn that between 2003 and 2005 the FBI issued more than 140,000 specific demands under this provision. It did not, however, come as any surprise to me. Three years ago, I received a national security letter (NSL) in my capacity as the president of a small Internet access and consulting business. The letter ordered me to provide sensitive information about one of my clients. There was no indication that a judge had reviewed or approved the letter, and it turned out that none had. The letter came with a gag provision that prohibited me from telling anyone, including my client, that the FBI was seeking this information. Based on the context of the demand -- a context that the FBI still won't let me discuss publicly -- I suspected that the FBI was abusing its power. Living under the gag order has been stressful and surreal. Under the threat of criminal prosecution, I must hide all aspects of my involvement in the case -- including the mere fact that I received an NSL -- from my colleagues, my family and my friends. When I meet with my attorneys I cannot tell my girlfriend where I am going or where I have been. I hide any papers related to the case in a place where she will not look. When clients and friends ask me whether I am the one challenging the constitutionality of the NSL statute, I have no choice but to look them in the eye and lie. At some point -- a point we passed long ago -- the secrecy itself becomes a threat to our democracy.

The FBI man in charge of collecting evidence from the government building destroyed by the Oklahoma bomb has called for the case to be reopened. Former deputy assistant director Danny Coulson ... said a federal grand jury is now needed to find out what really happened. He argues this is the only way to prove whether other people were involved in the bombing in a wider conspiracy beyond Timothy McVeigh and Terry Nichols. Mr Coulson spent 31 years in the FBI. Between 1991 and 1997 he was the deputy assistant director of the Criminal Division of the FBI in Washington, responsible for all violent crime cases in the United States. Mr Coulson said there were some "very strong indicators" that other people were involved with Timothy McVeigh. The FBI interviewed 24 people who claimed to have seen McVeigh in Oklahoma City with someone else on the morning of the attack, yet the only known accomplice of McVeigh, Terry Nichols, was at home in Kansas over 200 miles away on that day. The FBI's investigation concluded that the eyewitnesses were unreliable. However, Danny Coulson says they were "extremely credible" and had no reason to make it up. "If only one person had seen it, or two of three, but 24?" he said. "I know FBI headquarters told [agents] to close down the investigation in Elohim City which has some very significant connections to Mr McVeigh. "Never in my career did I have FBI headquarters tell me not to investigate something." Last December a US Congressional report found no conclusive evidence of a wider conspiracy, but the report concluded that "questions remain unanswered and mysteries remain unsolved."

Note: Don't miss a highly revealing four-minute video-clip showing live media coverage of the Oklahoma City bomb available here. The official story is that one truck with a huge bomb was parked in front of the Oklahoma City federal building and only Timothy McVeigh and his partner were involved. The news footage proves that others must have been involved, as multiple unexploded bombs were recovered from points inside the building. Yet none of this was questioned in later testimony.

Welcome to the new world of border security. Unsuspecting Americans are turning up at the Canadian border expecting clear sailing, only to find that their past -- sometimes their distant past -- is suddenly an issue. There was a time not long ago when a trip across the border from the United States to Canada was accomplished with a wink and a wave of a driver's license. Those days are over. Take the case of 55-year-old Lake Tahoe resident Greg Felsch. Stopped at the border in Vancouver this month at the start of a planned five-day ski trip, he was sent back to the United States because of a DUI conviction seven years ago. Not that he had any idea what was going on when he was told at customs: "Your next stop is immigration." Felsch was ushered into a room. "There must have been 75 people in line," he says. "We were there for three hours. One woman was in tears. A guy was sent back for having a medical marijuana card. I felt like a felon with an ankle bracelet." Or ask the well-to-do East Bay couple who flew to British Columbia this month for an eight-day ski vacation at the famed Whistler Chateau, where rooms run to $500 a night. They'd made the trip many times, but were surprised at the border to be told that the husband would have to report to "secondary" immigration. There, in a room he estimates was filled with 60 other concerned travelers, he was told he was "a person who was inadmissible to Canada." The problem? A conviction for marijuana possession ... in 1975. This is just the beginning. Soon other nations will be able to look into your past when you want to travel there.

Gov. Rick Perry on Thursday angrily defended his relationship with Merck & Co. and his executive order requiring that schoolgirls receive the drugmaker's vaccine against the sexually transmitted cervical-cancer virus. The Associated Press reported Wednesday that Perry's chief of staff had met with key aides about the vaccine on Oct. 16, the same day Merck's political action committee donated $5,000 to the governor's campaign. In issuing the order, the governor made Texas the first state to require the vaccine Gardasil for all schoolgirls. But many lawmakers have complained about his bypassing the Legislature altogether. The executive order has inflamed conservatives, who said it contradicts Texas' abstinence-only sexual education policies and intrudes into families' lives. Critics have previously questioned Perry's ties to Merck. Mike Toomey, Perry's former chief of staff, now lobbies for the drug company. And the governor accepted a total of $6,000 from Merck during his re-election campaign. Merck has waged a behind-the-scenes lobbying campaign to get state legislatures to require girls to get the three-dose vaccine to enroll in school. But on Tuesday the pharmaceutical company announced it was suspending the effort because of pressure from parents and medical groups. The Kentucky House on Thurday passed a bill that would require the vaccination for middle school girls unless their parents sign a form opposing it. Virginia lawmakers have also passed legislation requiring the vaccine, but the governor has not decided if he will sign it.

Note: The drug company lobby is the most powerful in the U.S., as reported by the former editor-in-chief of one of the most respected medical journals in the U.S. Click here for more.

Pediatricians, gynecologists and even health insurers all call Gardasil, the first vaccine to prevent cervical cancer, a big medical advance. But medical groups, politicians and parents began rebelling after disclosure of a behind-the-scenes lobbying campaign by Gardasil's maker, Merck & Co., to get state legislatures to require 11- and 12-year-old girls to get the three-dose vaccine as a requirement for school attendance. Some parents' groups and doctors particularly objected because the vaccine protects against a sexually transmitted disease. Vaccines mandated for school attendance usually are for diseases easily spread through casual contact, such as measles and mumps. Bowing to pressure, Merck said Tuesday that it is immediately suspending its controversial campaign, which it had funded through a third party. Legislatures in roughly 20 states have introduced measures that would mandate girls have the vaccine to attend school. Texas Gov. Rick Perry on Feb. 2 issued an executive order requiring Texas girls entering the sixth grade as of 2008 get the vaccinations. Dr. Anne Francis, who chairs an American Academy of Pediatrics committee [stated] "I believe that their timing was a little bit premature," she said, "so soon after (Gardasil's) release, before we have a picture of whether there are going to be any untoward side effects." The country has been "burned" by some drugs whose serious side effects emerged only after they were in wide use, including Merck's withdrawn painkiller Vioxx. The vaccine also is controversial because of its price - $360 for the three doses required.

Note: $360 for every girl in school would amount to quite a hefty transfer of funds from taxpayers into the pockets of Merck. Could profit and campaign contributions be behind the move to make this mandatory?

Let's say your teenager is a habitual truant and there is nothing you can do about it. A Washington area politician thinks he might have the solution: Fit the child with a Global Positioning System chip, then have police track him down. "It allows them to get caught easier," said Maryland Delegate Doyle Niemann (D-Prince George's), who recently co-sponsored legislation in the House that would use electronic surveillance as part of a broader truancy reduction plan. "It's going to be done unobtrusively. The chips are tiny and can be put into a hospital ID band or a necklace." Niemann's legislation mirrors a bill sponsored by state Sen. Gwendolyn Britt (D-Prince George's). Both would provide truants and their parents with better access to social services, such as mental health evaluations and help with schoolwork. Electronic monitoring would be a last resort. Still, the prospect of tagging children and using them in some "catch and release" hunt by police casts a pall over everything that's good about the plan. Odd how billions and billions of dollars keep going to a war that almost nobody wants, but there's never enough to fund the educational programs that nearly everybody says are needed. Aimed solely at students in Prince George's — the only predominantly black county in the Washington area — the truancy effort is called a "pilot program," a first-of-its-kind experiment. It would cost $400,000 to keep track of about 660 students a year.

Note: For more reliable information on the push to microchip the entire population, click here.

A disturbing recent phenomenon in Washington is that laws that strike to the heart of American democracy have been passed in the dead of night. So it was with a provision quietly tucked into the enormous defense budget bill at the Bush administration’s behest that makes it easier for a president to override local control of law enforcement and declare martial law. The provision, signed into law in October, weakens two obscure but important bulwarks of liberty. One is the doctrine that bars military forces, including a federalized National Guard, from engaging in law enforcement. The other is the Insurrection Act of 1807, which ... essentially limits a president’s use of the military in law enforcement to putting down lawlessness, insurrection and rebellion, where a state is violating federal law or depriving people of constitutional rights. The newly enacted provisions upset this careful balance. The president may now use military troops as a domestic police force in response to a natural disaster, a disease outbreak, terrorist attack or to any “other condition.” Changes of this magnitude should be made only after a thorough public airing. But these new presidential powers were slipped into the law without hearings or public debate. The president made no mention of the changes when he signed the measure, and neither the White House nor Congress consulted in advance with the nation’s governors.

A judge Friday indicted 26 Americans and five Italians in the abduction of an Egyptian terror suspect on a Milan street in what would be the first criminal trial stemming from the CIA’s extraordinary rendition program. Prosecutors allege that five Italian intelligence officials worked with the Americans to seize Muslim cleric Osama Moustafa Hassan Nasr on Feb. 17, 2003. Nasr was allegedly transferred by vehicle to the Aviano Air Force base near Venice, then by air to the Ramstein Air Base in Germany, and on to Egypt, where his lawyer says he was tortured. Nasr was freed earlier this week by an Egyptian court that found his four years of detention in Egypt “unfounded.” All but one of the Americans have been identified as CIA agents, including the former Milan station chief Robert Seldon Lady and former Rome station chief Jeffrey Castelli. Among the Italians indicted by Judge Caterina Interlandi was the former chief of military intelligence, Nicolo Pollari, and his former deputy, Marco Mancini. The CIA has refused to comment on the case, which has put an uncomfortable spotlight on its operations. Prosecutors are pressing the Italian government to seek the extradition of the Americans. In Italy, defendants can be tried in absentia. Prosecutors elsewhere in Europe are moving ahead with cases aimed at the CIA program. A Munich prosecutor recently issued arrest warrants for 13 people in another alleged CIA-orchestrated kidnapping, that of a German citizen who says he was seized in December 2003 at the Serbian-Macedonia border and flown to Afghanistan.

Note: At long last, the CIA is beginning to be held accountable for flagrantly breaking laws resulting in torture.

The CIA’s former No. 3 official and a defense contractor were charged Tuesday with fraud and other offenses in the corruption investigation that sent former Rep. Randy “Duke” Cunningham to prison. Federal indictments named Kyle “Dusty” Foggo, executive director of the CIA until he resigned in May, and his close friend, San Diego defense contractor Brent Wilkes, both 52, according to two government officials who spoke on condition of anonymity. One of the officials said the grand jury heard claims that Foggo joined Wilkes on trips to Hawaii and Scotland, and was introduced to Wilkes’ employees as early as 2003 as a “future executive” of Wilkes’ company, Wilkes Corp., which allegedly received $12 million in illicit contracts from various government agencies. Cunningham, an eight-term Republican, served on the House Intelligence Committee and on the defense subcommittee of the Appropriations Committee — assignments that made him a key figure in the awarding of Pentagon contracts. Cunningham pleaded guilty in November 2005 to taking $2.4 million in bribes from defense contractors and others, including mortgage payments and a yacht he named “Duke-Stir.” The indictments paint a stunning picture of corruption in Washington. The alleged crimes by Cunningham and defense contractors is, according to the U.S. Attorney in San Diego, "breathtaking in scope." Foggo was named executive director of the CIA in 2004, responsible for running the agency’s day-to-day operations. He retired in May while under investigation by the FBI, the Internal Revenue Service, the Pentagon, the CIA and the U.S. attorney’s office in San Diego.

Note: This is very encouraging news as the once "untouchable" CIA is finally being subject to some of the same laws and justice as the rest of us.

In the two decades since private equity firms first stormed the business world, they've been called a lot of things, from raiders to barbarians. But only [the Carlyle Group] has been tagged in the popular imagination with warmongering, treason, and acting as cold-eyed architects of government conspiracies. Carlyle, founded 20 years ago in the shadow of Washington's power centers, long went about its business far from the public eye. Its ranks were larded with the politically connected, including former Presidents, Cabinet members, even former British Prime Minister John Major. It used its partners' collective relationships to build a lucrative business buying, transforming, and selling companies -- particularly defense companies that did business with governments. Carlyle's radical makeover has turned the firm into the biggest fund-raising juggernaut the private equity world has ever seen. By the end of this year it expects to have an unprecedented $85 billion in investor commitments under management, up sixfold from 2001 and more than any other firm. [Founder David] Rubenstein sees the total swelling to as much as $300 billion by 2012. Make no mistake -- Carlyle is already massive. It owns nearly 200 companies that generate a combined $68 billion in revenue and employ 200,000 people. Last year it bought a new company approximately once every three days and sold one almost once a week -- all while dabbling in increasingly esoteric investments. Since its founding in 1987 it has generated annualized after-fee returns of 26%, compared with the industry average in the mid-teens.

Note: With former presidents including George H.W. Bush and many other top world politicians helping to sway huge military contracts, could this be considered a form of insider trading? Those 26% yearly returns are placing our tax monies in the hands of individuals and companies that are already among the wealthiest in the world. For lots more on manipulation of your tax money, click here. And for a Washington Post article showing Osama Bin Laden's brother met with George H.W. Bush at a Carlyle meeting one day before 9/11, click here.

Although the Bush administration has said that six U.S. attorneys were fired recently in part because of "performance related" issues, at least five of them received positive job evaluations before they were ordered to step down. Attorney General Alberto Gonzales, using authority he gained in March from a little-noticed provision of the Patriot Act, has appointed interim U.S. attorneys from the Bush administration's inner circle. Daniel Bogden, the U.S. attorney in Nevada, was described in his last job performance evaluation in 2003 as being a "capable" leader who was highly regarded ... said a Justice Department official. David Iglesias, the U.S. attorney in New Mexico, also received a positive evaluation last year, according to another Justice Department official. Both officials asked not to be identified. The other U.S. attorneys who received good reviews were John McKay, the former U.S. attorney in Seattle; Paul Charlton, the former U.S. attorney in Arizona; and Carol Lam, the current U.S. attorney in San Diego. The decision to fire the U.S. attorneys came under scrutiny late last month after Senate Democrats discovered a change in the Patriot Act that allowed Gonzales to appoint interim U.S. attorneys for indefinite terms without Senate approval. In testimony to the Senate Judiciary Committee last week, [Deputy Attorney General Paul] McNulty conceded that H.E. "Bud" Cummins, the former U.S. attorney in Arkansas, wasn't fired because of how he handled his job. Rather, McNulty said, administration officials wanted to make room for Timothy Griffin, a former aide of presidential adviser Karl Rove.

Note: To read a related Associated Press article on U.S. Attorney General Gonzalez, click here. The article starts with "Attorney General Alberto Gonzales criticized federal judges ... for ruling on cases that affect national-security policy. Judges, he contended, are unqualified to decide terrorism issues that he said are best settled by Congress or the president." Isn't that negating the balance of powers laid out in the U.S. Constitution?

A furious row has been raging in the international Jewish community over the rights and wrongs of criticising Israel. At its centre is a British historian [Tony Judt] who accuses his fellow Jews in the US of stifling any debate about Israel. His opponents say his views give succour to anti-Semites. In an essay written by the Holocaust scholar Alvin Rosenfeld and published by the American Jewish Committee, Judt's views - and those of other 'progressive Jews' ... were expressly linked to anti-Semitism. That row was reported in the New York Times, giving it an unprecedented prominence, and since then the story has opened the floodgates of a debate that until now has been shrouded in fear. Americans have long been in the grip of a cultural taboo that is characterised by Judt as follows: 'All Jews are silenced by the requirement to be supportive of Israel, and all non-Jews are silenced by the fear of being thought anti-Semitic, and there is no conversation on the subject.' [A] new forum for dissent ... was launched in Britain last week by an eminent group. In launching its manifesto, Independent Jewish Voices has taken the 40th anniversary of the occupation of the West Bank and Gaza Strip as an occasion to create 'a climate and a space in which Jews of different affiliations and persuasions can express their opinions about the actions of the Israeli government without being accused of disloyalty or ... self-hating.' One of its founding principles is: 'The battle against anti-Semitism is vital and is undermined whenever opposition to Israeli government policies is automatically branded as anti-Semitic.'

A recent poll by the respected New York Times revealed that three out of four Americans now suspect the U.S. government of not telling the truth about 9/11. This proportion has shot up from a year ago, when half the population said they did not believe the official story. [The] accepted version of what happened on 9/11 is being challenged by a 90-minute internet movie, [Loose Change, which is] so popular that up to 100 million viewers have watched [it]. Why were no military aircraft scrambled in time to head off the attacks? How could a rookie pilot - as one of the terrorists was - fly a Boeing 757 aircraft so precisely into the Pentagon? The movie's assertions are being explored by a number of commentators in America and Britain. Former Labour Cabinet Minister Michael Meacher ... has said of 9/11: "Never in modern history has an event of such cataclysmic significance been shrouded in such mystery." These words were written in a foreword for Professor David Ray Griffin's bestselling book, The New Pearl Harbour. Griffin ... is emeritus professor at the Claremont School of Theology in California and a respected philosopher. Together, the book and the movie have raised the question: could the attack be a carbon copy of Operation Northwoods, an aborted plan by President Kennedy to stage terror attacks in America and blame them on Communist Cuba as a pretext for a U.S. invasion to overthrow Fidel Castro? Initially ... Professor Griffin dismissed claims the attacks could have been an inside job. It was only a year later ... that the professor was sent a 'timeline' on the day's events based entirely on newspaper and television accounts. It was then that he changed his mind.

Note: The timeline which opened Prof. Griffin's eyes was the two-page 9/11 timeline from WantToKnow.info available at http://www.WantToKnow.info/9-11cover-up. This is the most supportive article yet by the mainstream media. The word is spreading. For lots more reliable, verifiable information on 9/11, click here.

Cities should close schools for up to three months in the event of a severe flu outbreak, ball games and movies should be canceled ... the federal government advised today in issuing new pandemic flu guidelines to states and cities. Health officials acknowledged that such measures would hugely disrupt public life, but they argued that these measure would buy the time needed to produce vaccines and would save lives. “We have to be prepared for a Category 5 pandemic,” said Dr. Martin Cetron, director of global migration and quarantine for the Centers for Disease Control and Prevention. “It’s not easy. The only thing that’s harder is facing the consequences.” The new guidelines also advocate having sick people and all their families' even apparently healthy members stay home for 7 to 10 days. Any pandemic is expected to move faster than a new vaccine can be produced. Current experimental vaccines against H5N1 avian flu are in short supply and based on strains isolated in 2004 or 2005. Although the government is creating a $4 billion stockpile of the antiviral drug Tamiflu, it is only useful when taken within the first 48 hours, and Tamiflu-resistant flu strains have already been found. The historian John Barry, author of “The Great Influenza,” a history of the 1918 flu, questioned an idea underpinning the study’s conclusions. There is evidence, he said, that some cities with low sickness and death rates in 1918 ... were hit by a milder spring wave of the virus. That would have, in effect, inoculated their citizens against the more severe fall wave and might have been more important than their public health measures.

Note: Why is it that government officials seem to want us to be afraid? Could it be that when we live in fear, we are more willing to give up our freedoms and money and allow them to be in control? For more, click here. And why would the government spend billions on stockpiling drugs of questionable use? For an answer, click here.

A new breed of lifestyle drugs could allow us to choose how much we sleep, boost our memories and even allow us to enjoy ourselves more, without any side effects. Will they unleash human capabilities never seen before or create a dystopian 24-hour society where we are dependent on drugs to regulate our lifestyle and behavior? One drug already available is modafinil, marketed as the vaguely Orwellian-sounding Provigil. It enables those who take it to stay awake and alert for 48 hours. It is a eugeroic that delivers a feeling of wakefulness without the physical or mental jitter. There is already a market for it for those without any medical need - it is developing a cult following among workaholics and students studying for exams. The military is also very interested in eugeroic. Their reliance on amphetamines for lengthy operations have had catastrophic consequences in the past. The "friendly-fire" incidents in Afghanistan in 2002 when U.S. pilots killed Canadian troops was blamed on the "go pills" they had taken. The U.S. Defense Advanced Research Projects Agency (DARPA) tested a compound called CX717 in its quest to find a drug that can create a "metabolically dominant war-fighter of the future" able to function for seven days without sleep. CX717 is an ampakine, a compound that increases the brains computing powers. It re-writes the rules of what it takes to create a memory and just how strong those memories can be. Will cans of soda containing eugeroics or ampakines be as common as caffeine drinks on the shelves of 24-hour stores? The potential is certainly there for a brave new world of personality medication.

There are no magic bullets in the fight against cancer: that's the first thing every responsible scientist mentions when discussing a possible new treatment, no matter how promising. If there were a magic bullet, though, it might be something like dichloroacetate, or DCA, a drug that kills cancer cells by exploiting a fundamental weakness found in a wide range of solid tumors. So far, though, it kills them just in test tubes and in rats infected with human cancer cells; it has never been tested against cancer in living human beings. DCA ... is an existing drug whose side effects are well-studied and relatively tolerable. Also, it's a small molecule that might be able to cross the blood-brain barrier to reach otherwise intractable brain tumors. Within days after a technical paper on DCA appeared in the journal Cancer Cell last week, the lead author, Dr. Evangelos Michelakis of the University of Alberta, was deluged with calls and e-mails from prospective patients—to whom he can say only, “Hang in there.” DCA is a remarkably simple molecule. It acts in the body to promote the activity of the mitochondria. Researchers have assumed that the mitochondria in cancer cells were irreparably damaged. But Michelakis wondered if that was really true. With his colleagues he used DCA to turn back on the mitochondria in cancer cells—which promptly died. One of the great things about DCA is that it's a simple compound, in the public domain, and could be produced for pennies a dose. But that's also a problem, because big drug companies are unlikely to spend a billion dollars or so on large-scale clinical trials for a compound they can't patent.

Note: For a 2010 follow-up by Dr. Michelakis with promising results, click here and watch a 10-minute video at this link. For the DCA website, click here. Thank you Newsweek for this important article. Why haven't any other mass media reported this major story? Why aren't many millions of dollars being poured into research? Notice even Newsweek acknowledges the drug companies are not interested in finding a cure for cancer if they can't make a profit from it. Some suspect the drug companies have even suppressed cancer cures found in the past. For one amazing example of this, click here.

A community of people who believe the government is beaming voices into their minds ... may be crazy, but the Pentagon has pursued a weapon that can do just that. An academic paper written for the Air Force in the mid-1990s mentions the idea of [such] a weapon. "The signal can be a 'message from God' that can warn the enemy of impending doom, or encourage the enemy to surrender." In 2002, the Air Force Research Laboratory patented precisely such a technology: using microwaves to send words into someone's head. The patent was based on human experimentation in October 1994 at the Air Force lab, where scientists were able to transmit phrases into the heads of human subjects, albeit with marginal intelligibility. The official U.S. Air Force position is that there are no non-thermal effects of microwaves. Yet ... the military's use of weapons that employ electromagnetic radiation to create pain is well-known. In 2001, the Pentagon declassified one element of this research: the Active Denial System, a weapon that uses electromagnetic radiation to heat skin and create an intense burning sensation. While its exact range is classified, Doug Beason, an expert in directed-energy weapons, puts it at about 700 meters, and the beam cannot penetrate a number of materials, such as aluminum. Given the history of America's clandestine research, it's reasonable to assume that if the defense establishment could develop mind-control or long-distance ray weapons, it almost certainly would. And, once developed, the possibility that they might be tested on innocent civilians could not be categorically dismissed.

Note: For lots more reliable, verifiable information on the little-known, yet critical topic of nonlethal weapons, click here. For an excellent two-page summary of government mind control programs, click here.

A two-year congressional inquiry into the Oklahoma City bombing concludes that the FBI didn't fully investigate whether other suspects may have helped Timothy McVeigh and Terry Nichols with the deadly 1995 attack, allowing questions to linger a decade later. The House International Relations investigative subcommittee [declared that] there is no conclusive evidence of a foreign connection to the attack, but that far too many unanswered questions remain. The report also sharply criticizes the FBI for failing to be curious enough to pursue credible information that foreign or U.S. citizens may have had contact with Nichols or McVeigh and could have assisted their plot. "We did our best with limited resources, and I think we moved the understanding of this issue forward a couple of notches even though important questions remain unanswered," Rep. Dana Rohrabacher, R-Calif., the subcommittee chairman, said in an interview with The Associated Press. Rohrabacher's subcommittee saved its sharpest words for the Justice Department, saying officials there exhibited a mindset of thwarting congressional oversight and did not assist the investigation fully.

Note: Should you choose to explore the deadly Oklahoma City bombing, you will find that there are many strange inconsistencies suggesting a major cover-up. If you are interested in more, you might start here.

The Taliban ... briefly banned poppy cultivation in 2000 in an effort to gain U.S. diplomatic recognition and aid. When the Bush administration invaded Afghanistan in October 2001, poppies were grown on only 7,600 hectares. Under the American occupation ... poppy cultivation spread to every province, and overall production has increased exponentially ever since -- this year by 60 percent. Within Afghanistan, where perhaps 3 million people draw direct income from poppy, profits may reach $3 billion this year. In-country profit adds up to an estimated 60 percent of Afghanistan's gross domestic product, or more than half the country's annual income. Afghanistan provides 92 percent of the world's heroin. Through many administrations, the U.S. government has been implicated in the Afghan drug trade. Before the American and Pakistani-sponsored mujahedeen took on the Soviets in 1979, Afghanistan produced a very small amount of opium for regional markets, and no heroin at all. By the end of the jihad against the Soviet army, it was the world's top producer of both drugs. The CIA made it all possible by providing legal cover for these operations. The United States [encouraged] Islamist extremists (then "our" soldiers) and ... set the stage for the Taliban. [Currently,] President Hamid Karzai['s] strategy is to avoid confrontation, befriend potential adversaries and give them offices, often in his Cabinet. The trade penetrates even the elected Parliament. Among the 249 members of the Wolesi Jirga (lower house) are at least 17 known drug traffickers, in addition to 40 commanders of armed militias, 24 members of criminal gangs, and 19 men facing serious allegations of war crimes.

Note: Could it be that some U.S. officials are turning a blind eye, or even supporting this drug trade? For some very strong evidence of this from a former award-winning DEA agent turned journalist and author, click here.

Democrats Pray for a Senator's Health, as Senate Control Hangs in Balance

South Dakota Sen. Tim Johnson remained in critical condition today after undergoing emergency surgery for bleeding in his brain — an illness that could have immense political implications. They say that he has a congenital arteriovenous malformation — an abnormally tangled network of arteries and veins in his brain that ruptured, causing the bleeding. He is a modest, quiet man in an institution full of egos and sharp elbows, and has a mostly liberal voting record and a moderate demeanor. Beyond praying for a friend, Democrats may also be praying to keep their narrow 51-49 Senate majority. If Johnson's Senate seat were to become vacant, South Dakota law would empower Republican Gov. Mike Rounds to appoint a replacement. He would likely pick a fellow Republican, creating a 50-50 Senate with Vice President Cheney as the tie-breaker, leaving the GOP again in control of the Senate.

Note: Yet another amazing coincidence which could give Republicans control of the Senate. Few are aware aware that the deaths of Governor Mel Carnahan and Senator Paul Wellstone just a few years ago gave the Republicans control of the Senate. For more on this and the suspicious circumstances surrounding their two plane crashes just weeks before their elections, click here. For information on "non-lethal weapons" using directed beam technology which can cause illness and even death from a distance, click here and here.

Robert Gates will face ... the enormous task of cleaning up the Pentagon's tangled finances, which outside auditors lambaste as so chaotic that no one knows how much money is being spent on defense at any given time. The White House's Office of Management and Budget believes the Pentagon's financial management systems are in such a mess "that independent auditors still cannot certify the accuracy of the financial statements." David Walker, the U.S. Comptroller General, issued a devastating assessment of the Pentagon's finances, which include an annual budget of over $500 billion. The Pentagon's financial problems "are pervasive, complex, long-standing and deeply rooted in virtually all business operations throughout the department," Walker told the Senate Armed Services Committee. Financial problems like the Pentagon's "would put any civilian company out of business," said Kwai Chan, a former GAO auditor ... and author of a report entitled "Financial Management in the Department of Defense: No One is Accountable." Winslow Wheeler, a former national security expert for the Senate Budget Committee, called the Defense Department "the worst-managed agency in the federal government, (that) can't account for the half-trillion dollars it spends each year, and seeks to produce weapons that are irrelevant or ineffective, or both."

Note: For major media articles showing that more than $1 trillion of taxpayers money have gone missing at the Pentagon, click here. For the deeper reasons behind this, a top U.S. general's explanation is available here.

For decades, Israel coyly has refused to confirm or deny what, since 1986, the whole world has known for sure: that is that the Jewish state is the one country in the Middle East that has a well-developed, nuclear arsenal. It was 20 years ago that Mordechai Vanunu, a former technician at Israel's Dimona nuclear facility in the Negev Desert, informed Britain's Sunday Times about the weapons program, leading "defense analysts to rank the country as the [world's] sixth largest nuclear power." Vanunu was jailed for 18 years for revealing state secrets. Israel calls its refusal to deny or confirm the existence of its nuclear arms its "nuclear ambiguity" policy. Why? Explains the Times (U.K.): "For many years, Israel was the only country outside the five declared nuclear powers to have built an atomic weapon ... It wanted its enemies in the region to know that it had nuclear capability if threatened. But it also wanted to keep the existence secret so that it did not fall [a]foul of international action designed to halt the proliferation of nuclear weapons, particularly strict U.S. laws which could have jeopardized billions of dollars in annual aid." The Jerusalem Post notes that "Nuclear ambiguity was a comfortable arrangement for both Israeli and U.S. administrations, designed to allow Israel to get on with whatever it was doing ... without too much international pressure, and [to allow] the U.S. to not seem too hypocritical by not demanding its Middle East ally sign the [Non-proliferation Treaty]. Ambiguity might have worked for four decades, but ... it is now hopelessly outdated."

Note: The media has been quite reluctant to discuss these issues openly. Could it be they fear people might question the amount of U.S. aid? Israel's population is 6.5 million. Official U.S. yearly foreign aid to Israel has been about $2.5 to 3.0 billion for many years. If you do the math, U.S. taxpayers are giving every man, woman, and child in Israel about $400/year -- over ten times the per capita rate paid to any other country. That's quite a yearly gift! A Christian Science Monitor article says if all forms of aid are considered, the figures are even higher.

Stock sales by America's corporate leaders exceeded purchases last month by the widest ratio in nearly 20 years. Executives sold $63.18 of shares for every $1 they bought in November, the largest ratio since at least January 1987. U.S. securities laws require company executives and directors to disclose stock purchases or sales within two business days. Insiders sold $8.4 billion in shares last month, according to data compiled from SEC filings. Buying was ... $133 million. The overall insider-selling amount was the fifth-highest since 1987. Selling peaked at $13.9 billion in March 2000. The data have "value for investors," said Wayne Reisner at Carret Asset Management in New York. "It's people who are very familiar with their company and their stock." Insiders executed 6.34 sales transactions for each purchase transaction in the eight weeks ended Dec. 1. That's up from 2.45 in the period ended Aug. 4 and above the ratio of 2.25 he considers neutral for the market. Microsoft ranked first among U.S. companies, with $594.2 million in sales by insiders in November. Seagate Technology and DreamWorks Animation SKG Inc. ranked second and third, at $311.8 million and $224.2 million, respectively. Google Inc. was fourth, at $182.1 million.

Note: Isn't it interesting that the NASDAQ stock index reached it's all-time high in March 2000, the exact month executive stock selling hit its record, and just prior to the huge NASDAQ crash. Is it possible that corporate executives knew something the rest of us didn't?

The Pentagon ... has resisted entreaties from U.S. anti-narcotics officials to play an aggressive role in the faltering campaign to curb the country's opium trade. Military units in Afghanistan largely overlook drug bazaars, rebuff some requests to take U.S. drug agents on raids and do little to counter the organized crime syndicates shipping the drug to Europe, Asia and, increasingly, the United States. Poppy cultivation has exploded, increasing by more than half this year. Afghanistan supplies about 92% of the world's opium. "It is surprising to me that we have allowed things to get to the point that they have," said ... a former top State Department counter-narcotics official. Outgoing Defense Secretary Donald H. Rumsfeld has said that Afghanistan's flourishing opium trade is a law enforcement problem, not a military one. The opium trade is one-third of the country's economy. Several dozen kingpins ... have become more brazen, richer and powerful. [They] openly run huge opium bazaars and labs that turn opium into heroin. [The] head of the United Nations Office on Drugs and Crime said ... that the location of major drug operations were "well-known to us and to the authorities." The Pentagon has balked at drug interdiction efforts even when it had the resources, said a former senior U.S. anti-drug official. "There were [drug] convoys where military people looked the other way," the former official said. "DEA would identify a lab to go hit or a storage facility and [the Pentagon] would find a reason to ground the helicopters." A recent congressional report said the DEA asked the Pentagon for airlifts on 26 occasions in 2005, and the requests were denied in all but three cases.

Note: Some observers and insiders believe the reason Afghanistan was attacked is because the Taliban had virtually stopped the opium trade in 2001. For reliable evidence supporting these allegations, click here.

No longer a gleam in the Pentagon's eye, ray guns — or radiofrequency (RF) weapons, to be exact — officially have arrived. As troops are increasingly forced to serve as an ad hoc police force, nonlethal weapons have become a priority for the military. The Department of Defense is currently testing the Active Denial System (ADS), which fires pain-inducing beams of 95-GHz radio waves, for deployment on ground vehicles. This surface heating doesn't actually burn the target, but is painful enough to force a retreat. While the military continues to investigate the safety of RF-based weapons, defense contractor Raytheon has released Silent Guardian, a stripped-down version of the ADS, marketed to law enforcement and security providers as well as to the military. Using a joystick and a targeting screen, operators can induce pain from over 250 yards away, as opposed to more than 500 yards with the ADS. Unlike its longer-ranged counterpart, Silent Guardian is available now. As futuristic — and frightening — as the ADS "pain ray" sounds, the Air Force Office of Scientific Research is funding an even more ambitious use of RF energy. Researchers at the University of Nevada are investigating the feasibility of a method that would immobilize targets without causing pain. Rather than heating the subject's skin, this approach would use microwaves at 0.75 to 6 GHz to affect skeletal muscle contractions. This project is still in the beginning stages. The ADS, on the other hand, is already a painful reality.

When Mexican president Vicente Fox leaves office this week and Felipe Calderon takes his place, President Bush will be the last of the so-called three amigos. Bush, Fox, and, of course, Canadian prime minister Paul Martin were the originators of the so-called Security and Prosperity Partnership, which critics call nothing more than a North American [U]nion. It means open borders, commerce of all [kinds] ... without the approval of either American voters or the U.S. Congress. An effort, the governments say, to harmonize regulation and increase cooperation between three very different countries. A new Canadian prime minister [is] joining the discussions as this North American partnership barrels ahead, with departments and ministries of all three governments working quickly to integrate North America by 2010. Now Mexico's new president, Felipe Calderon, [is] widely expected to keep the progress moving. Critics, though, say there's too little transparency and no congressional oversight. [Tom Fitton of Judicial Watch says] "There's nothing wrong with neighboring governments talking to each other, synchronizing their watches to make sure they're all on the same page in the cases of emergency or on trade issues or even on the flows of goods and people. But if policies are being made that the American people might oppose, or that are contrary to the law ... they're doing something a bit more nefarious." [Fitton] points to SPP documents urging the free flow of goods and people across borders and a wish list from business interests that borders remain open during a flu pandemic. Worse, critics say foreign policy elites are promoting a European-style union, erasing borders between the three countries and eventually moving to a single North American currency called the [Amero].

Note: To view the CNN broadcast of the above, click here. The Canadian TV network CNBC also carried a two-minute report on one of the supposed outcomes of the SPP, the Amero, which is a new common currency being planned for use by Canada, the U.S., and Mexico. To watch this news report, click here.

The Department of Agriculture declared safe for human consumption yesterday an experimental variety of genetically engineered rice found to have contaminated the U.S. rice supply this summer. The move ... to deregulate the special long-grain rice, LL601, was seen as a legal boon to its creator, Bayer CropScience. The company applied for approval shortly after the widespread contamination was disclosed in August and now faces a class-action lawsuit filed by hundreds of farmers in Arkansas and Missouri. The experimental rice ... escaped from Bayer's test plots after the company dropped the project in 2001. The resulting contamination, once it became public, prompted countries around the world to block rice imports from the United States, sending rice futures plummeting and farmers into fits. In approving the rice, the USDA allowed Bayer to take a regulatory shortcut and skip many of the usual safety tests. Joseph Mendelson, legal director of the nonprofit Center for Food Safety, said the quick approval shows that the USDA is more concerned about the fortunes of the biotechnology industry than about consumers' health. "USDA is telling agricultural biotechnology companies that it doesn't matter if you're negligent, if you break the rules, if you contaminate the food supply with untested genetically engineered crops, we'll bail you out," Mendelson said in a statement. Officials in Europe, where genetically altered rice is derisively dubbed "Frankenfood," made clear as recently as last week that European countries will not accept any U.S. rice, he said.

Note: For reliable information on the deception and dangers of GM (Genetically Modified) food, click here.

A sprawling waterfront state park known as Camp Hero [is situated] in Montauk on Long Island. Conspiracy theorists have long claimed that the park has been the site of sci-fi worthy events, including rifts in the time-space continuum [and] mind-control experiments. Such unsubstantiated reports were in large part ignited by a 1992 book, “The Montauk Project: Experiments in Time,” by Preston B. Nichols with Peter Moon.. “All of the rumors, that’s part of why we came here,” said Patrick Wenk, 26, of Stony Brook, N.Y., who was visiting one chilly autumn afternoon. His girlfriend, Sarah Holub, 25, [said] it was her friends who piqued her initial interest in the park by telling her about the conspiracy theories and rumors of paranormal occurrences. A search on Google revealed several Web sites that elaborated on the theories and suggested that Camp Hero was the site of time-travel experiments that picked up where the Philadelphia Experiment — in which a 1940s Navy ship and crew were said to have been made invisible and teleported from Philadelphia to Norfolk, Va. — left off. when Ms. Holub shared a story about her friends being in Camp Hero at night only to have all their flashlights go dead simultaneously, we both laughed. Yet I was experiencing some technical difficulties of my own. My reliable digital camera was on the fritz. I changed the batteries. I played with the lens. It would not take a photograph. I slipped it into my coat pocket to fiddle with later and continued my hike.

Note: Though it's difficult to find reliable information on these matters, those with an open mind and a desire to know might appreciate spending some time exploring the links above.

New video and photographic evidence ... puts three senior CIA operatives at the scene of Robert Kennedy's assassination. It reveals that the operatives and four unidentified associates were at the Ambassador Hotel, Los Angeles in the moments before and after the shooting on 5 June, 1968. The CIA had no domestic jurisdiction and some of the officers were based in South-East Asia at the time, with no reason to be in Los Angeles. Kennedy had just won the California Democratic primary on an anti-War ticket and was set to challenge Nixon for the White House. A 24-year-old Palestinian, Sirhan Sirhan, was arrested as the lone assassin. However, even under hypnosis, he has never been able to remember the shooting and defence psychiatrists concluded he was in a trance at the time. Witnesses placed Sirhan's gun several feet in front of Kennedy but the autopsy showed the fatal shot came from one inch behind. Dr Herbert Spiegel, a world authority on hypnosis at Columbia University, believes Sirhan may have been hypnotically programmed to act as a decoy for the real assassin. Three of these men have been positively identified as senior officers who worked together in 1963 at JMWAVE, the CIA's Miami base. David Morales was Chief of Operations and once told friends: "I was in Dallas when we got the son of a bitch and I was in Los Angeles when we got the little bastard." George Joannides was Chief of Psychological Warfare Operations. Now, we see him at the Ambassador Hotel the night a second Kennedy is assassinated.

Note: There is ample evidence that Sirhan Sirhan was a programmed Manchurian Candidate. Declassified CIA documents show that U.S. intelligence services were creating programmed assassins back as early as the 1950s. For reliable, verifiable information on this key topic, click here.

Lyndon Johnson relished summoning underlings in to confer with him while he sat on the toilet. Richard Nixon authorized illegal wiretaps on perceived enemies because, as he later told an interviewer, "when the president does it, it's not illegal." Bill Clinton wantonly had sex with intern Monica Lewinsky. Why is it said that power corrupts, and absolute power corrupts absolutely? In the past few years...research has zeroed in on what an intoxicating elixir power can be. And one thing has become clear: The phrase "drunk with power" is often a dead-on description. These new studies show that power acts to lower inhibitions, much the same as alcohol does. It explains why powerful people act with great daring and sometimes behave rather like gorillas. "Disinhibition is the very root of power," said Stanford Professor Deborah Gruenfeld, a social psychologist who focuses on the study of power. "For most people, what we think of as 'power plays' aren't calculated and Machiavellian -- they happen at the subconscious level. When people feel powerful, they stop trying to 'control themselves.'" People with power...tend to be more oblivious to what others think, more likely to pursue the satisfaction of their own appetites, poorer judges of other people's reactions, more likely to hold stereotypes, overly optimistic and more likely to take risks. People who are naturally selfish grow even more selfish if they attain power, while people who are naturally selfless and giving become more so with power. Henry Kissinger discerned that power is "the ultimate aphrodisiac." "Nearly all men can stand adversity," said Abraham Lincoln, "but if you want to test a man's character, give him power."

Note: This most excellent article graphically describes the problems that can occur when a hierarchical political systems places certain individuals in positions of great authority. For more on this fascinating topic, click here.

Federal health officials have decided to forgo gathering detailed data on whether children in 22 big cities are receiving recommended immunizations and instead will survey teenagers, who are the target of several new vaccines. The decision is drawing protests from local health officials, who say the soon-to-be-lost information is essential to their efforts to make sure that infants and toddlers, many from poor families, are protected against childhood infections. Each year, the CDC contracts a polling company to get data on vaccination rates in various age, demographic and income groups nationwide. "We need to know if the new vaccine has helped, or had no change, or hurt [coverage], and we cannot really make those judgments without the NIS data," [one health official] said. CDC officials said they are redirecting about $3 million to survey adolescents. The only way to pay for the 22-city sampling would be to use money now used to help states buy vaccine, they added. The decision comes at a time when the government is spending record amounts on public health. The CDC's budget has risen 42 percent since 2001 and is now $8.73 billion.

Note: This unusual decision makes sense if you consider that the powerful pharmaceutical industry doesn't want tracking on toddler vaccinations, as it may show what they have long denied -- that there is a link between autism and childhood vaccinations. The mercury-derivative Thimerosal was largely taken out of childhood vaccinations just a few years ago. The much-awaited data needed to prove or disprove a link will now be more difficult to obtain.

The US defence department has set up a new unit to better promote its message across 24-hour rolling news outlets, and particularly on the internet. The Pentagon said the move would boost its ability to counter "inaccurate" news stories and exploit new media. The newly-established unit would use "new media" channels to push its message and "set the record straight", Pentagon press secretary Eric Ruff said. A Pentagon memo seen by the Associated Press news agency said the new unit would "develop messages" for the 24-hour news cycle and aim to "correct the record". The unit would reportedly monitor media such as weblogs and would also employ "surrogates", or top politicians or lobbyists who could be interviewed on TV and radio shows.

After an avalanche of panicked inquiries from patients across the country who claim to have been stricken with a mysterious skin disease, the federal Centers for Disease Control and Prevention is preparing to begin a full investigation. The patients ... describe symptoms that include sores that are slow to heal, a sensation of things crawling through their skin, joint pain and persistent fatigue. Many say they believe they have Morgellons disease, a diagnosis that has received wide attention on the Internet but is viewed skeptically by some doctors. Morgellons disease joins a growing list of symptom clusters that public health officials have been forced to examine closely in part because of the organizing power and unprecedented reach of the Internet. Morgellons was brought to public attention by ... Mary Leitao, who in 2001 created a Web site describing the mysterious sores and bizarre threadlike extrusions that afflicted her young son. She said she had tried for years to find a medical explanation for his illness. Ultimately, she said, doctors accused her of staging it. After creating the Web site...she was inundated with e-mail messages from people who said they also had the disease. Many of the people who visit her site have been told by doctors that their symptoms are delusional. Several mothers...told her that they had lost custody of their children after doctors decided the youngsters’ symptoms were contrived. Doctors themselves are divided over whether Morgellons is a medical or a psychiatric illness. The patients are clearly suffering from something; it is just not clear what that something is. “I think it’s a real disease,” said Dr. Rafael Stricker, a physician in San Francisco who sees many patients claiming to have Morgellons. Many patients also test positive for Lyme disease.

Only a tiny fraction of Americans – 7 percent, according to a recent survey by The Ponemon Institute – change any behaviors in an effort to preserve their privacy. Few people turn down a discount at toll booths to avoid using the EZ-Pass system that can track automobile movements. And few turn down supermarket loyalty cards. Privacy will remain in the headlines in the months to come, as states implement the federal government’s Real ID Act, which will effectively create a national identification program by requiring new high-tech standards for driver’s licenses and ID cards. The “right to be left alone” is a decidedly conservative -- even Libertarian -- principle. People are now well aware there are video cameras and Internet cookies everywhere, [yet] there is abundant evidence that people live their lives ignorant of the monitoring. People write e-mails and type instant messages they never expect anyone to see. Just ask Mark Foley or even Bill Gates, whose e-mails were a cornerstone of the Justice Department’s antitrust case against Microsoft. It is also impossible to deny that Americans are now being watched more than at any time in history. But there is another point in the discussion about which there is little disagreement: The debate over how much privacy we are willing to give up never occurred.

The president has...managed to kill the writ of habeas corpus. Tonight, a special investigation, how that, in turn, kills nothing less than your Bill of Rights. Because the Mark Foley story began to break on the night of September 28...many people may not have noticed the bill passed by the Senate that night. Congress passed the Military Commission’s Act to give Mr. Bush the power to deal effectively with America’s enemies—those who seek to harm the country. He has been very clear on who he thinks that is. GEORGE W. BUSH: For people to leak that program and for a newspaper to publish it does great harm to the United States of America. That fact that we’re discussing this program is helping the enemy. OLBERMANN: So, the president said it was urgent that Congress send him this bill as quickly as possible, not for the politics of next month’s elections, but for America. One bit of trivia that caught our eye was the elimination of habeas corpus, which apparently used to be the right of anyone who’s tossed in prison to appear in court and say “Hey, why am I in prison?” COUNTDOWN has obtained a copy of [the] “Constitution” of the United States, and sources tell us it was originally sneaked through the constitutional convention and state ratification in order to establish America’s fundamental legal principles. There’s only one reference to habeas corpus: “The privilege of the writ of habeas corpus shall not be suspended unless when in cases of rebellion or invasion the public safety may require it.”

President Bush's frequent use of signing statements to assert that he has the power to disobey newly enacted laws is "an integral part" of his "comprehensive strategy to strengthen and expand executive power" at the expense of the legislative branch, according to a report by the non partisan Congressional Research Service. The research service said the Bush administration is using signing statements as a means to slowly condition Congress into accepting the White House's broad conception of presidential power, which includes a presidential right to ignore laws he believes are unconstitutional. The administration has suggested repeatedly that the president has exclusive authority over foreign affairs and has an absolute right to withhold information from Congress. Such assertions are "generally unsupported by established legal principles," the report said. Last week...Bush signed the 2007 military budget bill, but then issued a statement challenging 16 of its provisions. Bush has used signing statements to challenge more than 800 laws that place limits or requirements on the executive branch, saying they intrude on his constitutional powers. The American Bar Association called signing statements "contrary to the rule of law and our constitutional separation of powers." It said presidents cannot sign bills and then declare parts of them unconstitutional because a president has only two choices -- to sign a bill and enforce it as written, or to veto it and give Congress a chance to override the veto.

President Bush, again defying Congress, says he has the power to edit the Homeland Security Department's reports about whether it obeys privacy rules while handling background checks, ID cards and watchlists. In the law Bush signed Wednesday, Congress stated no one but the privacy officer could alter, delay or prohibit the mandatory annual report on Homeland Security department activities that affect privacy, including complaints. But Bush, in a signing statement attached to the agency's 2007 spending bill, said he will interpret that section "in a manner consistent with the President's constitutional authority to supervise the unitary executive branch." The American Bar Association and members of Congress have said Bush uses signing statements excessively as a way to expand his power. Bush's signing statement Wednesday challenges several other provisions in the Homeland Security spending bill. Bush, for example, said he'd disregard a requirement that the director of the Federal Emergency Management Agency must have at least five years experience and "demonstrated ability in and knowledge of emergency management and homeland security."

[Congressman] Foley's obsession with 16- and 17-year-old male pages has been known to Republicans on Capitol Hill for at least five years. But other than issue a warning, little else seems to have been done about the congressman. A former page has come forward to tell ABC News warnings were issued about Foley to the pages in 2001. Internet messages [were] sent by Foley to three different pages after that warning. Two of them were sent to pages in the 2001-2002 class, with sexually explicit messages, most too graphic to be broadcast, from Foley using the screen name Maf54. "Maf54: To be honest, I am a little to interested in you. So that's why I need to back off a little. Teen: Ya, slow things down a little im still young…like under 18. don't want to do anything illegal…im not 18. Maf54: cool..dont forget to measure for me." [This last sentence was] a reference to his request that the page provide the measurements of his sexual organ, a request he repeatedly made to another page as well. Former pages tell ABC News the pages involved with Foley were afraid to offend the powerful Republican congressman. It's possible Foley could end up being prosecuted under laws he helped to enact as the co-chairman of the House caucus on Missing and Exploited Children.

Note: If you want to know the degree of sexual corruption which reaches to the highest levels in government, see the incredibly well done Discovery Channel documentary Conspiracy of Silence available free online at http://www.WantToKnow.info/060501conspiracyofsilence

China has secretly fired powerful laser weapons designed to disable American spy satellites by "blinding" their sensitive surveillance devices. The hitherto unreported attacks have been kept secret by the Bush administration for fear that it would damage attempts to co-opt China in diplomatic offensives against North Korea and Iran. Sources told the military affairs publication Defense News that there had been a fierce internal battle within Washington over whether to make the attacks public. In the end, the Pentagon's annual assessment of the growing Chinese military build-up barely mentioned the threat. "After a contentious debate, the White House directed the Pentagon to limit its concern to one line," Defense News said. The document said that China could blind American satellites with a ground-based laser firing a beam of light to prevent spy photography as they pass over China. According to senior American officials: "China not only has the capability, but has exercised it." American satellites like the giant Keyhole craft have come under attack "several times" in recent years.

Note: Why are so few major media picking up this important news? A Google news search shows that the New York Sun is the only major media to have reported this news in the U.S.

There is little assurance your vote will count. As we've been reporting almost nightly...for more than a year, electronic voting machines are placing our democracy at risk. These machines time and again have been demonstrated to be extremely vulnerable to tampering and error, and many of them have no voter-verified paper trail. Only 27 states have laws requiring the use of voter-verified paper trails. 15 states [have] no mandated requirements for safeguarding your vote. During the 2004 presidential election, one voting machine...added nearly 3,900 additional votes to Bush's total. Officials caught the machine's error because only 638 voters cast presidential ballots at that precinct, but in a heavily populated district, can we really be sure the votes will be counted correctly? [In] the May primary election in Cuyahoga County, Ohio...the electronic voting machines' four sources of vote totals -- individual ballots, paper trail summary, election archives and memory cards -- didn't even match up. The report concluded that relying on the current system for Cuyahoga County's more than 1.3 million people should be viewed as "a calculated risk." Are we really willing to risk our democracy? A 2005 Government Accountability Office report on electronic voting confirmed the worst fears of watchdog groups and election officials. "There is evidence that some of these concerns have been realized and have caused problems with recent elections, resulting in the loss and miscount of votes." That is simply unacceptable. Congress and the White House need to immediately take steps to assure the integrity of electronic voting with paper trails that could be audited in any recount.

The U.S. military has created a global network of overseas prisons...keeping 14,000 detainees beyond the reach of established law. Disclosures of torture and long-term arbitrary detentions have won rebuke from leading voices including the U.N. secretary-general and the U.S. Supreme Court. Tens of thousands now have passed through U.S. detention. Many say they were caught up in U.S. military sweeps, often interrogated around the clock, then released months or years later without apology, compensation or any word on why they were taken. Seventy to 90 percent of the Iraq detentions in 2003 were "mistakes," U.S. officers once told the international Red Cross. The detention system often is unjust and hurts the war on terror by inflaming anti-Americanism in Iraq and elsewhere. Human rights groups count dozens of detainee deaths for which no one has been punished or that were never explained. The new manual banning torture doesn't cover CIA interrogators. Thousands of people still languish in a limbo, deprived of one of common law's oldest rights, habeas corpus, the right to know why you are imprisoned. The U.S. government has contended it can hold detainees until the "war on terror" ends. [Inmates] have been held without charge for three to four years. [Guantanamo's] population today...stands at 455. Only 10 of the Guantanamo inmates have been charged with crimes. In only 14 of 34 cases has anyone been punished for the confirmed or suspected killings of detainees. The stiffest sentence in a torture-related death has been five months in jail. In almost half of 98 detainee deaths, the cause was either never announced or reported as undetermined.

If you have a passport, now is the time to renew it -- even if it's not set to expire anytime soon. In many countries, including the United States, passports will soon be equipped with RFID chips. And you don't want one of these chips in your passport. RFID stands for "radio-frequency identification." Passports with RFID chips store an electronic copy of the passport information: your name, a digitized picture, etc. And in the future, the chip might store fingerprints or digital visas from various countries. By itself, this is no problem. But RFID chips don't have to be plugged in to a reader to operate. Like the chips used for automatic toll collection on roads or automatic fare collection on subways, these chips operate via proximity. The risk to you is the possibility of surreptitious access: Your passport information might be read without your knowledge or consent by a government trying to track your movements, a criminal trying to steal your identity or someone just curious about your citizenship. Security mechanisms are also vulnerable, and several security researchers have already discovered flaws. One found that he could identify individual chips via unique characteristics of the radio transmissions. Another successfully cloned a chip. The Colorado passport office is already issuing RFID passports, and the State Department expects all U.S. passport offices to be doing so by the end of the year. Many other countries are in the process of changing over. So get a passport before it's too late.

Many respected senior members of the U.S. military, intelligence services, and government have expressed significant criticism of the 9/11 Commission Report. Some even allege government complicity in the terrible acts of 9/11. Below are the highly revealing statements on this vital topic of over 50 prominent public servants with links for verification and further investigation. The collective voices of these respected senior officials give credibility to the claim that the 9/11 Commission Report is tragically flawed. These dedicated individuals from both political parties cannot be simply dismissed as irresponsible believers in some 9/11 conspiracy theory. Their sincere concern, backed by decades of service to their country, demonstrate that criticism of the 9/11 Commission Report is not only reasonable and responsible, it is in fact a patriotic duty.

A recent Scripps Howard/Ohio University poll of 1,010 Americans found that 36 percent suspect the U.S. government promoted the attacks or intentionally sat on its hands. Sixteen percent believe explosives brought down the towers. A Zogby International poll of New York City residents two years ago found 49.3 percent believed the government "consciously failed to act." The loose agglomeration known as the "9/11 Truth Movement" has stopped looking for truth from the government. The academic wing is led by [Prof. David Ray] Griffin, who founded the Center for a Postmodern World at Claremont University; James Fetzer, a tenured philosopher at the University of Minnesota; and Daniel Orr, the retired chairman of the economics department at the University of Illinois. The movement's de facto minister of engineering is Steven Jones, a tenured physics professor at Brigham Young University, who's ... concluded that the collapse of the twin towers is best explained as controlled demolition. Catherine Austin Fitts served as assistant secretary of housing in the first President Bush's administration. [Robert] Bowman was chief of advanced space programs under presidents Ford and Carter. Fitts and Bowman agree that the "most unbelievable conspiracy" theory is the one retailed by the government. It was a year before David Ray Griffin, an eminent liberal theologian and philosopher, began his stroll down the path of disbelief. He wondered why ... military jets failed to intercept even one airliner. He read the 9/11 Commission report with a swell of anger. Contradictions were ignored and no military or civilian official was reprimanded. Griffin's book, "The New Pearl Harbor" ... never reviewed in a major U.S. newspaper, sold more than 100,000 copies and became a movement founding stone.

New election machines, as mandated and funded by federal law, may create a new election debacle instead of correcting the old one. In 2002, Congress passed the Help America Vote Act (HAVA), which allocated $3.6 billion for all 50 states to update their voting systems. Some industry analysts suggest that the government implemented the new technology too quickly to the detriment of not only security and performance of the new machines, but the integrity of our democratic process. Avi Rubin, a computer science professor at John Hopkins University...performed an analysis of voting machines produced by Diebold. But his recommendation that the machines not be used in elections fell on deaf ears. NOW traveled to Oakland County, Michigan on Primary Day, where election workers encountered more than a few frustrating snags, even when demonstrating the machines for us. In one instance, it took five attempts for the machine to accept a ballot. We also checked in on other states. What we found were alarming scenes of computer and human error, poor results validation, nonexistent contingency plans, and extreme vulnerability to tampering. In half of 37 primaries held this year, there were technical problems associated with the new HAVA-mandated technology. These included an extra 100,000 votes recorded but never cast in Texas, which was blamed on a programming error [and] ballot counting malfunctions in Iowa that declared losing candidates as winners.

The latest "let's scare everyone" campaign is in full swing now, because the president's approval ratings go up every time the threat level reaches red. With the enthusiastic cooperation of the media, the government has managed to convince us that we are surrounded on every side by crazed bomb throwers and that we must at all times be vigilant and allow the government "to do its job," which is code for "anything it wants." Here's a headline from the Houston Chronicle: "Latest terror scares show airport threat lingers." That's like saying, "Latest false alarms show fire threat lingers." Since the object of terrorism is to spread terror, the "latest terror scares" demonstrate only that the government is abetting the work of terrorists. Here's my favorite story, as reported by the Associated Press: "A United Airlines flight...was delayed because a small boy said something inappropriate, according to a government official speaking on condition of anonymity because of the sensitivity of the information. 'He didn't want to fly,' the official said." I hope that small boys do not hear about this. Mad at Mommy? You can turn her airplane around! Listen to the people interviewed at airports. "It's worth it," they say, patiently standing in line. Is it worth it to, say, raise taxes to pay for better veterans benefits? Maybe it's easier to be afraid. Maybe it's easier to blame the shadowy forces of international terrorism for everything that's scary or evil or mean. Maybe it's easier than saying that poverty has killed more people than the terrorists have; that preventable diseases have killed more children than the terrorists have; that the rights we don't fight for are the rights we lose.

Three things can be expected from Bush's speech, according to a new study by three Columbia University researchers: The media will repeat the president's remarks. Public fear of terrorism will increase. And the president's poll numbers will rise. Those have been the effects of presidential pronouncements on terrorism since the Sept. 11 attacks, according to political scientists. "These are interesting findings, and confirm what many of us had suspected," said Mark Juergensmeyer, director of Global and International Studies at UC Santa Barbara. "This public panic benefits the terrorists whose work is made easier by an overactive government response that magnifies their efforts. In an odd way this puts the government and the terrorists in league with one another," he said. "The main loser, alas, is the terrified public." [The study's author said terrorists] "want to intimidate, they want to spread fear and anxiety." Larry Beutler, director of the National Center on the Psychology of Terrorism in Palo Alto, who reviewed the Columbia team's research [commented] "There are findings suggesting that the administration's use of the alert system increased inordinately before the election and each time it did, Bush's numbers went up about 5 percent." The research is also a "damning indictment of the media's bloodlust," said Matthew T. Felling, media director for the Center for Media and Public Affairs in Washington.

It was early December 2002. [Carlotta] Gall, the Afghanistan correspondent for The New York Times, had just seen a press release from the U.S. military announcing the death of a prisoner at its Bagram Air Base. Soon thereafter the military issued a second release about another detainee death at Bagram. Gall: “I just wanted to know more. And I came up against a blank wall." The body of one of the detainees had been returned, a young taxi driver known as Dilawar. Gall met with Dilawar’s family, and his brother handed Gall a death certificate...that the military had issued. “It said, ‘homicide.’ The press release announcing Dilawar’s death stated...heart attack, a conclusion repeated by the top U.S. commander in Afghanistan. But the death certificate, the authenticity of which the military later confirmed to Gall, stated that Dilawar — who was just twenty-two years old — died as a result of “blunt force injuries to lower extremities complicating coronary artery disease.” Gall filed a story. It sat for a month. “I very rarely have to wait long for a story to run.” Gall’s story...had been at the center of an editorial fight. Roger Cohen, then the Times’s foreign editor: “I pitched it, I don’t know, four times at page-one meetings, with increasing urgency and frustration. My single greatest frustration as foreign editor was my inability to get that story on page one.” The story ran on page fourteen under the headline "U.S.Military Investigating Death of Afghan in Custody." The Times also reported that officers who had overseen the Bagram prison at the time were promoted; another, who had lied to investigators, was transferred to help oversee interrogations at Abu Ghraib and awarded a Bronze Star.

Note: Why does it take a university journal to ask the hard questions? Again and again, news that should be front-page headlines is buried on insignificant pages or not reported at all. This key article from one of the most respected schools of journalism in the world tells it all about the unreported and underreported violent abuse of prisoners condoned by elements of the U.S. military. Don't miss reading this most powerful story in its entirety.

The New York Times' Web site is blocking British readers from a news article detailing the investigation into the recent airline terror plot. "We had clear legal advice that publication in the U.K. might run afoul of their law," Times spokeswoman Diane McNulty said Tuesday. "It's a country that doesn't have the First Amendment, but it does have the free press. We felt we should respect their country's law." Visitors who click on a link to the article, published Monday, instead got a notice explaining that British law "prohibits publication of prejudicial information about the defendants prior to trial." The blocked article reveals evidence authorities have in the alleged plot to use liquid explosives to down U.S. airliners over the Atlantic. The Times also blocked U.K. access to an audio summary of the top Times stories, which included the article in question. British readers could find excerpts posted on Web journals and other unblocked sites. In fact, the Daily Mail of London published an article on the case, attributing details to the Times. The Times also is keeping the article out of printed editions published in the U.K. or mailed to U.K. subscribers.

Note: To see the blocked article, click here. The more likely reason for blocking the article is that it makes clear that the threat was significantly exaggerated by authorities and that experts on the case were unsure "whether any of the suspects was technically capable of assembling and detonating liquid explosives." Clearly, there are those who want to keep us in fear in order to gain ever greater control.

Ten years ago today, one of the most controversial news articles of the 1990s quietly appeared on the front page of the San Jose Mercury News. Titled "Dark Alliance"...the three-part series by reporter Gary Webb linked the CIA and Nicaragua's Contras to the crack cocaine epidemic that ripped through South Los Angeles in the 1980s. Most of the nation's elite newspapers at first ignored the story. A public uproar, especially among urban African Americans, forced them to respond. What followed was one of the most bizarre, unseemly and ultimately tragic scandals in the annals of American journalism. Top news organizations closed ranks to debunk claims Webb never made, ridicule assertions that turned out to be true and ignore corroborating evidence when it came to light. The whole shameful cycle was repeated when Webb committed suicide in December 2004. At first, the Mercury News defended the series, but after nine months, Executive Editor Jerry Ceppos wrote a half-apologetic letter to readers that defended "Dark Alliance" while acknowledging obvious mistakes. Webb privately (and accurately) predicted the mea culpa would universally be misperceived as a total retraction, and he publicly accused the paper of cowardice. He resigned a few months later. Meanwhile, spurred on by Webb's story, the CIA conducted an internal investigation that acknowledged in March 1998 that the agency had covered up Contra drug trafficking for more than a decade. History will tell if Webb receives the credit he's due for prodding the CIA to acknowledge its shameful collaboration with drug dealers.

Note: Many thanks to the Los Angeles Times for the courage to report this story. For more on this incredibly revealing, yet very tragic case which reveals corruption in both the government and media at the highest levels: http://www.WantToKnow.info/mediacover-up#webb

The term we employ is the 'Nexus of Politics and Terror.' It does not imply that there is no terror. But it also does not deny that there is politics, and it refuses to assume that counterterror measures in this country are not being influenced by politics. [Here are] remarks made on May 10, 2005 by [former Secretary of Homeland Security, Tom Ridge] discussing the old color-coded terror threat warning system. 'Sometimes we disagreed with the intelligence assessment. There were times when some people were really aggressive about raising it. And we said, "For that?" In the light of those remarks...it is imperative that we examine each of the coincidences of timing since 2002, including the one last week, in which excoriating comments by leading Republicans about leading Democrats just happened to precede arrests in a vast purported terror plot, arrests that we now know were carried out on a time line requested not by the British, nor necessitated by the evidence, but requested by this government. We introduce these coincidences to you exactly as we did when we first compiled this top 10 list after the revelation that the announced threats New York's subway system, last October, had been wildly overblown. [See either of the two links above for the 10 highly suspicious coincidences, or view the broadcast at the links below.]

A shell coated with depleted uranium pierces a tank like a hot knife through butter. It also leaves behind a fine radioactive dust with a half-life of 4.5 billion years. Depleted uranium is the garbage left from producing enriched uranium for nuclear weapons and energy plants. At Walter Reed Army Medical Center in Washington, D.C., [Herbert Reed] ran into a buddy from his unit. And another, and another. They began to talk. [They] all have depleted uranium in their urine. The veterans, using their positive results as evidence, have sued the U.S. Army, claiming officials knew the hazards of depleted uranium, but concealed the risks. The Department of Defense says depleted uranium is powerful and safe. Military research on mice shows that depleted uranium can enter the bloodstream and come to rest in bones, the brain, kidneys and lymph nodes. Other research in rats shows that DU can result in cancerous tumors and genetic mutations. Fifteen years after it was first used in battle, there is only one U.S. government study monitoring veterans exposed to depleted uranium. Number of soldiers in the survey: 32. Depleted uranium falls into the quagmire of Gulf War Syndrome, from which no treatment has emerged. About 30 percent of the 700,000 men and women who served in the first Gulf War still suffer [this] baffling array of symptoms. Depleted uranium has long been suspected as a possible contributor. It took more than 25 years for the Pentagon to acknowledge that Agent Orange...was linked to [major disease and] sufferings. It took 40 years for the military to compensate sick World War II vets exposed to massive blasts of radiation during tests of the atomic bomb.

Note: Why isn't the media reporting more on this health disaster? For lots more on how veterans suffer from corporate and governmental denial and manipulations, see what a highly decorated U.S. General has to say on the suffering of soldiers at http://www.WantToKnow.info/warcoverup. For an amazingly revealing documentary with interviews from top sources on the depleted uranium cover-up, click here.

The Bush administration drafted amendments to the War Crimes Act that would retroactively protect policy makers from possible criminal charges for authorizing any humiliating and degrading treatment of detainees, according to lawyers who have seen the proposal. At issue are interrogations carried out by the CIA and the degree to which harsh tactics such as water-boarding were authorized by administration officials. When interrogators engage in waterboarding, prisoners are strapped to a plank and dunked in water until nearly drowning. One section of the draft would outlaw torture and inhuman or cruel treatment, but it does not contain prohibitions from Article 3 of the Geneva Conventions against "outrages upon personal dignity, in particular humiliating and degrading treatment." Another section would apply the legislation retroactively. The initiative is "not just protection of political appointees, but also CIA personnel who led interrogations." Interrogation practices "follow from policies that were formed at the highest levels of the administration."

Nearly all members of the House of Representatives opted out of a chance to read this year's classified intelligence bill, and then voted on secret provisions they knew almost nothing about. The bill, which passed by 327 to 96 in April, authorized the Bush administration's plans for fighting the war on terrorism. Many members say they faced an untenable choice: Either consent to a review process so secretive that they could never mention anything about it in House debates, under the threat of prosecution, or vote on classified provisions they knew nothing about. Most chose to know nothing. A Globe survey sent to all members of the House, [revealed] the vast majority of the respondents ... said they typically don't read the classified parts of intelligence bills. The failure to read the bill, however, calls into question the vows of many House members to provide greater oversight of intelligence. The rules make open debate on intelligence policy and funding nearly impossible, lawmakers say. Revealing classified secrets has long been a crime, punishable by expulsion from the House and criminal prosecution. Operating largely in secret, the intelligence panels have a limited staff because of the security clearances involved. Further, committee members can't go to outside experts to vet policies or give advice, leaving members with no way to fact-check the administration's assertions. Democratic and Republican leaders are no longer briefed together, raising questions about whether the two leaders are being told the same things.

Note: If above link fails, click here. If you want to understand how U.S. Congressional representatives are kept in the dark and easily manipulated when it comes to intelligence matters, this article is a must read.

Two Oakland police officers working undercover at an anti-war protest in May 2003 got themselves elected to leadership positions in an effort to influence [a] demonstration. The department assigned the officers to join activists protesting the U.S. war in Iraq ... a police official said last year in a sworn deposition. [At the] demonstration, police fired nonlethal bullets and bean bags at demonstrators who blocked the Port of Oakland's entrance in a protest. Dozens of activists and longshoremen on their way to work suffered injuries ranging from welts to broken bones and have won nearly $2 million in legal settlements from the city. In a deposition related to a lawsuit filed by protesters, Deputy Police Chief Howard Jordan said activists had elected the undercover officers to "plan the route of the march and decide I guess where it would end up and some of the places that it would go." Oakland police had also monitored online postings by the longshoremen's union regarding its opposition to the war. The documents ... were released Thursday by the American Civil Liberties Union, as part of a report criticizing government surveillance of political activists since the terrorist attacks of Sept. 11, 2001. Jordan ... noted that "two of our officers were elected leaders within an hour on May 12." The idea was "to gather the information and maybe even direct them to do something that we want them to do." The ACLU said the Oakland case was one of several instances in which police agencies had spied on legitimate political activity since 2001.

Drug companies are accused today of endangering public health through widescale marketing malpractices, ranging from covertly attempting to persuade consumers that they are ill to bribing doctors and misrepresenting the results of safety and efficacy tests on their products. In a report that charts the scale of illicit practices by drug companies in the UK and across Europe, Consumers International - the world federation of consumer organisations - says people are not being given facts about the medicines they take because the companies hide the marketing tactics on which they spend billions. "Irresponsible marketing practices form a serious, persistent and widespread problem among the entire pharmaceutical industry," says the report, which analyses the conduct of 20 of the biggest companies. Scandals such as the withdrawal of Vioxx ... show that unethical drug promotion is a consumer concern. Merck withdrew the drug in September 2004, but allegedly knew it could increase the chances of heart attacks and strokes from 2000 and has been accused of manipulating study results to play down the risk. More than 6,000 lawsuits have been filed against the company in the United States by people who claim they suffered heart attacks as a result of the drug. There is no room for complacency when drug companies spend twice as much on marketing as on research...but do not publish information on their drug promotion practices.

Hundreds of protesters gathered outside an exclusive California retreat for government and business leaders Saturday to challenge the right of a "ruling elite" to make policy decisions without public scrutiny. The annual Bohemian Grove retreat has attracted powerful men such as Ronald Reagan, George Bush, former Secretary of State Henry Kissinger, philanthropist David Rockefeller, former West German Chancellor Helmut Schmidt and former House Speaker Newt Gingrich. It's also become a magnet for all types of activists who increasingly use the event to network and organize their campaigns. The men who attend the Bohemian Grove retreat spend two weeks performing plays, eating gourmet camp grub, listening to speakers and power-bonding at the 2,700-acre compound near the Russian River in Sonoma County. The retreat is organized by the exclusive San Francisco-based Bohemian Club. The club and event are shrouded in mystery, much like Yale University's most-famous secret society, Skull and Bones, whose members include President George W. Bush and his presidential rival Sen. John Kerry.

Note: This article strangely has been removed from the San Francisco Chronicle website. To see it in the Internet Archive, click here. For an informative five-minute ABC news clip on the power elite gathering Bohemian Grove reported in 1981, click here. And for reliable information on the most secretive meeting of the world's elite reported by the major media, see our Bilderberg Group compilation available here.

The House, displaying a foreign affairs solidarity lacking on issues like Iraq, voted overwhelmingly Thursday to support Israel in its confrontation with Hezbollah guerrillas. The resolution, which was passed on a 410-8 vote, also condemns enemies of the Jewish state. House Republican leader John Boehner cited Israel's "unique relationship" with the United States as a reason for his colleagues to swiftly go on record supporting Israel in the latest flare-up of violence in the Mideast. Yet as Republican and Democratic leaders rally behind the measure in rare bipartisan fashion, a handful of lawmakers have quietly expressed reservations that the resolution was too much the result of a powerful lobbying force and attempts to court Jewish voters.

In these perilous days, we must be ready to think the unthinkable. I'm talking about...the quite reasonable suspicion that the Bush Administration orchestrates its terror alerts and arrests to goose the GOP's poll numbers. The 18 months prior to the 2004 presidential election witnessed a barrage of those ridiculous color-coded terror alerts, quashed-plot headlines and breathless press conferences from Administration officials. Warnings of terror attacks over the Christmas 2003 holidays, warnings over summer terror attacks at the 2004 political conventions, then a whole slew of warnings of terror attacks to disrupt the election itself. Even the timing of the alerts seemed to fall with odd regularity right on the heels of major political events. One of Department of Homeland Security chief Tom Ridge's terror warnings came two days after John Kerry picked John Edwards as his running mate; another came three days after the end of the Democratic convention. So it went right through the 2004 election. And then not long after the [elections], terror alerts seemed to go out of style. With the exception of one warning about mass-transit facilities in response to the London bombing on July 7, 2005, that was pretty much it until this summer. Can I prove any of this was politically motivated? Of course not. All the key facts are veiled in secrecy, as they must be. So it's impossible to know from the outside whether it's on the level or not. But with another election looming, it seems we're about to get a bunch of new chances to wonder.

Journalists regularly hold back information for national security reasons; I recently withheld information at the request of the intelligence community. The one thing worse than a press that is "out of control" is one that is under control. Anybody who has lived in a Communist country knows that. Just consider what would happen if the news media as a whole were as docile to the administration as Fox News or The Wall Street Journal editorial page. When I was covering the war in Iraq, we reporters would sometimes tune to Fox News and watch, mystified, as it purported to describe how Iraqis loved Americans. Such coverage...misled conservatives about Iraq from the beginning. The real victims of Fox News weren't the liberals it attacked but the conservatives who believed it. Historically, we in the press have done more damage to our nation by withholding secret information than by publishing it. One example was this newspaper's withholding details of the plans for the Bay of Pigs invasion. President Kennedy himself suggested that the U.S. would have been better served if The Times had published the full story and derailed the invasion. Then there were the C.I.A. abuses that journalists kept mum about until they spilled over and prompted the Church Committee investigation in the 1970's. In the run-up to the Iraq war, the press...was too credulous about claims that Iraq possessed large amounts of W.M.D. In each of these cases...we failed in our watchdog role, and we failed our country. So be very wary of Mr. Bush's effort to tame the press. Watchdogs can be mean, dumb and obnoxious, but it would be even more dangerous to trade them in for lap dogs.

John Reid, the home secretary, is planning a new official secrets law to punish intelligence officers who blow the whistle on government policy by leaking secret information. He wants longer jail sentences and the removal of a key legal defence of 'necessity' for whistleblowers. The crackdown is aimed at preventing cases such as that of Katharine Gun, a former translator at GCHQ, the government's eavesdropping centre, who leaked a memo showing that in the months before the Iraq war in 2003 the Americans wanted GCHQ's help in bugging the homes and offices of UN security council members. The government dropped its case against her after she threatened to use the necessity defence that she broke the law to prevent a greater 'crime' in the form of an invasion of Iraq. Ministers are also concerned at the growing number of leaks of sensitive documents by dissident officials, including those relating to the MI5 investigation into the July 7 bombings. It will be the first change to the official secrets legislation since 1989 when the government removed the right of whistleblowers to claim a defence of public interest.

In the guise of fighting terrorism and maintaining public order, Tony Blair's Government has quietly and systematically taken power from Parliament and the British people. The author charts a nine-year assault on civil liberties that reveals the danger of trading freedom for security. A new law...says that no one may demonstrate within a kilometre...of Parliament Square if they have not first acquired written permission. This effectively places the entire centre of British government...off-limits to the protesters. Blair...turns out to have an authoritarian streak. What is remarkable...is the harm his government has done to the unwritten British constitution in those nine years, without anyone really noticing, without the press objecting or the public mounting mass protests. Last year...I started to notice trends in Blair's legislation...to put in place all the necessary laws for total surveillance of society. The right not to be tried twice for the same offence...no longer exists. The presumption of innocence is compromised. The ID card [and] centralised database...will log and store details of every important action in a person's life. "You and I will carry them because we are upright citizens. But a terrorist ...will be carrying yours." Once a person is arrested he or she may be fingerprinted and photographed by the police and have a DNA sample removed with an oral swab - by force if necessary...before that person has been found guilty of any crime, whether it be dropping litter or shooting someone.

A bill becomes the rule of the land when Congress passes it and the president signs it into law, right? Not necessarily, according to the White House. A law is not binding when a president issues a separate statement saying he reserves the right to revise, interpret or disregard it on national security and constitutional grounds. That's the argument a Bush administration official is expected to make Tuesday before the Senate Judiciary Committee, chaired by Arlen Specter, R-Pa., who has demanded a hearing on a practice he considers an example of the administration's abuse of power. "It's a challenge to the plain language of the Constitution," Specter said in an interview. [Bush has] challenge[d] many more statutes passed by Congress than any other president. Specter's hearing is about more than the statements. He's been compiling a list of White House practices he bluntly says could amount to abuse of executive power from warrantless domestic wiretapping program to sending officials to hearings who refuse to answer lawmakers' questions. But Specter and his allies maintain that Bush is doing an end-run around the veto process. In his presidency's sixth year, Bush has yet to issue a single veto. Instead, he has issued hundreds of signing statements invoking his right to interpret or ignore laws on everything from whistleblower protections to how Congress oversees the Patriot Act.

Amid daily revelations about prewar intelligence and a growing scandal surrounding the indictment of the vice president's chief of staff and presidential adviser, Lewis "Scooter" Libby, FRONTLINE goes behind the headlines to investigate the internal war that was waged between the intelligence community and Richard Bruce Cheney, the most powerful vice president in the nation's history. "A lot of what needs to be done here will have to be done quietly, without any discussion, using sources and methods that are available to our intelligence agencies," Cheney told Americans just after 9/11. He warned the public that the government would have to operate on the "dark side." In The Dark Side, airing June 20, 2006, at 9 P.M. on PBS...FRONTLINE tells the story of the vice president's role as the chief architect of the war on terror and his battle with Director of Central Intelligence George Tenet for control of the "dark side." Drawing on more than 40 interviews and thousands of documents, the film provides a step-by-step examination of what happened inside the councils of war. After the attacks on 9/11, Cheney seized the initiative and pushed for expanding presidential power, transforming America's intelligence agencies, and bringing the war on terror to Iraq. In the initial stages of the war on terror, Tenet's CIA was rising to prominence as the lead agency in the Afghanistan war. But when Tenet insisted in his personal meetings with the president that there was no connection between Al Qaeda and Iraq, Cheney and Rumsfeld initiated a secret program to re-examine the evidence and marginalize the agency and Tenet.

The Bush administration told a judge in Detroit that the president's warrantless domestic spying is legal and constitutional, but refused to say why. The judge should just take his word for it, the lawyer said, because merely talking about it would endanger America. Today, Senator Arlen Specter wants his Judiciary Committee to take an even more outlandish leap of faith for an administration that has shown it does not deserve it. Mr. Specter wants the committee to approve a bill he drafted that tinkers dangerously with the rules on wiretapping, even though the president has said the law doesn't apply to him anyway, and even though Mr. Specter and most of the panel are just as much in the dark as that judge in Detroit. The bill could well diminish the power of the Foreign Intelligence Surveillance Act, known as FISA, which was passed in 1978 to prevent just the sort of abuse that Mr. Bush's program represents. This is not a time to offer the administration a chance to steamroll Congress into endorsing its decision to ignore the 1978 intelligence act and shred constitutional principles on warrants and on the separation of powers. This is a time for Congress to finally hold Mr. Bush accountable for his extralegal behavior and stop it.

The provincial government will announce tomorrow that Ontario is embracing more nuclear power plants. Premier Dalton McGuinty has privately spoken of his government's plans to confidants for days, insiders say. In an off-the-record speech on Saturday night in Ottawa to the secretive Bilderberg group, McGuinty discussed the pros and cons of more nuclear plants. The premier privately admitted the public will officially learn of the plans tomorrow. Insiders told the Star he was unequivocal in private conversations about his support for the controversial electricity source. McGuinty's staff deliberately omitted any mention of his speech Saturday to the Bilderberg session...from his public itinerary. The group, named for the Dutch hotel the organization first met at in 1954, holds its sessions behind closed doors amid tight security. Because participants in Bilderberg sessions are sworn to secrecy under threat of ex-communication from the group, politicians tend to lower their guard and speak candidly. It was the kind of power-broker audience the premier, who sat with Pataki, Reisman and Queen Beatrix, would want to reach when delivering a message about investing in Ontario — and massive investment will be required to pay for $40 billion in nuclear plants.

Note:If the above link fails, click here. If the Bilderbergers truly support the interests of all of us, why the need for so much secrecy? Why is there no website? Why until just a few years ago was there virtually no reporting on the influential Bilderberg Group at all in the major media?

Four days after they arrived quietly at a Kanata hotel, the world's rich and powerful left just as mysteriously, in limos and SUVs with blacked-out windows. The Bilderberg Group, a secretive organization of politicians and business leaders from around the world, gave no public statements. With private security guards and metal barriers keeping outsiders on the street, the Bilderbergers met privately and then whisked themselves away in ones and twos, mostly to the airport. What they talked about at the Brookstreet Hotel is still a secret. The group meets annually, and is usually rumoured to discuss international politics and business, from Middle East crises to oil prices. They emerged singly yesterday -- Bilderberg president Etienne Davignon of Belgium, American David Rockefeller, Italian economist Mario Monti, European competition commissioner Neelie Kroes from the Netherlands, and, watchers thought, Iraqi politician Ahmed Chalabi. Protesters on the sidewalk have their own version of the agenda: world domination, a merger of Canada with the United States and Mexico, hiding the cure for cancer, suppression of cars that get 200 miles per gallon of fuel, [and] an invasion of Iran.

Note: This article lists the names and descriptions of 21 participants of this Bilderberg meeting. If you read through them, you will see that they are clearly among the most powerful and wealthy people in the world.

Among prominent attendees at this year's conference of the Bilderberg group, a secretive society that includes some of the world's most powerful people: Jacques Aigrain, CEO of Swiss Re. Ahmad Chalabi, former deputy prime minister of Iraq and long-time opponent of Saddam Hussein. George A. David, chairman of Coca-Cola. Paul Desmarais, CEO of Power Corporation. Richard Holbrooke, key American negotiator for 1995 Bosnian peace accords. Vernon Jordan, friend and onetime presidential aide to Bill Clinton. Henry Kissinger, foreign-policy guru and secretary of state under Richard Nixon. Ed Kronenburg, director of NATO's private office. Bernardino Leon Gross, Spain's foreign minister. Ronald S. Lloyd, chairman of Credit Suisse First Boston. Queen Beatrix of The Netherlands. Gordon Nixon, Royal Bank of Canada president, CEO. George Pataki, governor of New York state. Richard Perle, senior foreign policy adviser to U.S. President George W. Bush. David Rockefeller, retired banker, heir to oil fortune. Dennis Ross, former Clinton Mideast negotiator. Giulio Tremonti, VP of Italy's chamber of deputies. James Wolfensohn, U.S. Mideast envoy, former head of the World Bank. Robert Zoellick, deputy U.S. secretary of state.

Note: If the above link fails, click here. For those who know about the pre-war manipulations involving weapons of mass destruction in Iraq, the participation of Ahmed Chalabi speaks volumes. And for a revealing three-minute video clip on CNN about this highly secretive group, click here.

A serene setting in Ottawa's west-end Kanata suburb has been transformed into a four-day festival of black suits, black limousines, burly security guards and a bevy of conspiracy theories. The security outside the Brookstreet Hotel is much tighter than it is on Parliament Hill. Inside, the CBC was told, all guests were asked to check out at 8:30 a.m. on Thursday. The hotel appears to be hosting the annual meeting of one of the world's most secretive and powerful societies: the Bilderberg group. But, of course, no one will admit it. People who follow the Bilderberg group say it persuaded Europe to adopt a common currency, and, among other things, persuaded Bill Clinton to support the North American Free Trade Agreement. "David Rockefeller is going to be here. Henry Kissinger is going to be here. Wolfowitz, the president of the World Bank, is going to be here" says Daniel Estulin, who has written a book about the Bilderberg group. Jim Tucker, who has followed the Bilderberg group for the last 30 years, told CBC News he is troubled by all the secrecy. "Officials of the United States government [should not] have a private meeting with private citizens about public policy," Tucker says.

Greeted at the airport by limousine drivers holding single-letter "B" signs, global luminaries such as Henry Kissinger, David Rockefeller and Queen Beatrix of the Netherlands began quietly slipping into Ottawa yesterday for the annual gathering of the ultra-secretive Bilderberg Group. The group's discreet approach was evident as attendees arrived yesterday at the Ottawa Airport. Outside the airport, a phalanx of limousines lined up to ferry guests to the Brookstreet. Approached by a Citizen reporter upon his arrival, former U.S. defence policy adviser Richard Perle shot down criticism about the secrecy of the group's meetings. "It's a private organization," he said. He denied the charge, advanced by Bilderberg critics, that the organization crafts public policy behind closed doors. "It discusses public policy," he stressed. Mr. Perle also dismissed suggestions that the group's heavy representation from the oil industry gives it influence over energy prices. Also seen arriving yesterday were Jorma Ollila, chairman of Royal Dutch Shell [and] World Bank president James Wolfenson. According to an unsigned press release sent by fax yesterday, presumably by Bilderberg organizers, attendees will also include New York Governor George Pataki, deputy prime minister of Iraq Ahmad Chalabi, the heads of Coca-Cola, Credit Suisse, [and] the Royal Bank of Canada. "The meeting is private to encourage frank and open discussion," said the release. "There will be no press conference."

Not only are America's prisons and jails largely failing the 13.5 million adults who pass through them each year, but the American public is also failing the prisons and jails. Politicians have passed laws dramatically increasing the inmate population to 2.2 million on a given day without understanding life behind bars or funding programs likely to help prisoners return home and not commit more crimes. Even the data that would help specialists make sense of U.S. crime and punishment are lacking. "We should be astonished by the size of the prisoner population, troubled by the disproportionate incarceration of African-Americans and Latinos, and saddened by the waste of human potential," [a] panel said in a report to be presented to Congress. The recent boom in imprisonment has not always made Americans safer. Each year, the United States spends an estimated $60 billion on corrections. The report...finds too much violence and too little medical and mental health care, as well as a "desperate need for the kinds of productive activities that discourage violence and make rehabilitation possible." Studies...suggest that the most accurate indicator of a successful return to society is the inmate's connection to family. The panel described the high-security segregation of inmates as "counter-productive," often leading to greater prison violence and more serious crimes upon release.

Note: Certain elite groups are making large profits on the dramatic increase in numbers of prisoners across the nation over the past two decades. The prison-industrial complex sadly draws very little media attention.

Members of the Bilderberg Group will descend on the upscale Brookstreet Hotel for the three-day meeting, several police sources confirmed yesterday. When asked about police plans for the event, a police spokeswoman referred the Citizen to Alan Bell of Globe Risk Holdings. Reached by phone, Mr. Bell -- who is listed as president of Globe Risk Holdings in Toronto and a former SAS paratrooper commando -- said he hadn't heard of the Bilderberg Group and denied that his firm has been hired to guard this week's conference. "Never heard of that conference. What is it?" said Mr. Bell before politely cutting the conservation short. But according to the company's website, Globe Risk Holdings specializes in "strategic planning and counter-measures," recruits its consultants primarily from elite military counter-terrorist and special forces units, and has "undertaken consultancy and project work worldwide in areas of high risk". "The consultants at Globe Risk Holdings have proven backgrounds in military, special forces, law enforcement and government organizations with real life expertise in the areas of international security...close protection, sabotage prevention, and military/law enforcement," reads the company website.

Note: Denial and lying seem to be standard protocol for those involved with the Bilderberg group. What does that say about what is being discussed in their secret meetings?

Canadian authorities detained an American activist filmmaker at the Ottawa airport late Wednesday night, confiscating his passport, camera equipment and most of his belongings. Citizenship and Immigration Canada agents stopped Alex Jones, whose films include Martial Law 9/11: The Rise of the Police State, and questioned him for nearly four hours before letting him go with only one change of clothes and telling him to return Thursday morning. “It’s really chilling, like a police state,” said Mr. Jones of his detention. Mr. Jones and his crew...travelled to Canada to film a documentary about the Bilderberg group, a secretive group of former politicians and business leaders who are meeting in Ottawa this week. A Citizenship and Immigration representative said that her department was unable to comment on Mr. Jones’ detention.

In a public health emergency, suspected victims would no longer have to give permission before experimental tests could be run to determine why they're sick, under a federal rule published Wednesday. Privacy experts called the exception unnecessary, ripe for abuse and an override of state informed-consent laws. Health care workers will be free to run experimental tests on blood and other samples taken from people who have fallen sick as a result of a bioterrorist attack, bird flu outbreak, detonation of a dirty bomb or any other life-threatening public health emergency, according to the rule issued by the Food and Drug Administration. The rule took effect Wednesday but remains subject to public comment until Aug. 7. The FDA said it published the rule without first seeking comments because it would hinder the response to an outbreak of bird flu or other public health emergency.

Ottawa. On the outskirts of the nation's capital, a tony high-rise hotel beside a golf course is hosting the annual meeting for one of the world's most secretive and powerful societies. They're called the Bilderberg group. Those who follow the Bilderberg group say it got Europe to adopt a common currency, got Bill Clinton elected after he agreed to support NAFTA, and is spending this week deciding what to do about high oil prices and that pesky fundamentalist president of Iran. The Bilderberg group is a half-century-old organization comprising about 130 of the world's wealthiest and most powerful people. They don't have a website. Bilderberg says the privacy of its meetings helps encourage freewheeling discussion. An unsigned press release...confirmed this year's meeting would deal with energy issues, Iran, the Middle East, terrorism, immigration, Russia, European-American relations and Asia. The 2006 group includes David Rockefeller, Henry Kissinger, Queen Beatrix of Holland, New York Gov. George Pataki, the heads of Coca-Cola, Credit Suisse, the Royal Bank of Canada, cabinet ministers from Spain, Greece and a number of media moguls. The group also includes a pair of prominent figures involved in planning the U.S. invasion of Iraq -- Richard Perle and Ahmad Chalabi. Fellow White House power-players Donald Rumsfeld and Paul Wolfowitz, now head of the World Bank, have spoken to the group in the past. The prime ministers of Britain and Canada -- Tony Blair and Stephen Harper -- have addressed the group before.

The Central Intelligence Agency took no action after learning the pseudonym and whereabouts of the fugitive Holocaust overseer Adolf Eichmann in 1958, according to C.I.A. documents that shed new light on the spy agency's use of former Nazis as informers after World War II. The United States government...had no policy at the time of pursuing Nazi war criminals. The documents show the C.I.A. "failed to lift a finger" to hunt Eichmann and "forced us to confront not only the moral harm but the practical harm" of relying on intelligence from ex-Nazis. As head of the Gestapo's Jewish affairs office during the war, Eichmann implemented the policy of extermination of European Jewry, promoting the use of gas chambers and having a hand in the murder of millions of Jews. The Eichmann papers are among 27,000 newly declassified pages released by the C.I.A. to the National Archives under Congressional pressure to make public files about former officials of Hitler's regime later used as American agents. The material reinforces the view that most former Nazis gave American intelligence little of value and in some cases proved to be damaging double agents for the Soviet K.G.B. Since Congress passed the Nazi War Crimes Disclosure Act in 1998, the Interagency Working Group has persuaded the government to declassify more than 8 million pages of documents. But the group ran into resistance starting in 2002 from the C.I.A., which sought to withhold operational files from the 1940's and 50's.

Facing a wave of litigation challenging its eavesdropping at home and its handling of terror suspects abroad, the Bush administration is increasingly turning to a legal tactic that swiftly torpedoes most lawsuits: the state secrets privilege. Officials have used the privilege...to ask the courts to throw out three legal challenges to the National Security Agency's domestic surveillance program. The privilege claim, in which the government says any discussion of a lawsuit's accusations would endanger national security, has short-circuited judicial scrutiny and public debate. While the privilege...was once used to shield sensitive documents or witnesses from disclosure, it is now often used to try to snuff out lawsuits at their inception. "If the very people you're suing are the ones who get to use the state secrets privilege, it's a stacked deck," said Representative Christopher Shays, Republican of Connecticut. Robert M. Chesney, a law professor at Wake Forest University...said the administration's legal strategy "raises profound legal and policy questions." Under Mr. Bush, the secrets privilege has been used to block a lawsuit by a translator at the Federal Bureau of Investigation, Sibel Edmonds, who was fired after accusing colleagues of security breaches. Two lawsuits challenging the government's practice of rendition, in which terror suspects are seized and delivered to detention centers overseas, were dismissed after the government raised the secrets privilege.

Note: Sibel Edmonds is one of several whistleblowers with powerfully incriminating information on 9/11 who have been silenced with tactics like those mentioned above. To learn more about this critical case which has been blocked, see http://www.WantToKnow.info/050131sibeledmonds

The Supreme Court restricted the free-speech rights of the nation's 21 million public employees Tuesday, ruling that the 1st Amendment does not protect them from being punished for complaining to their managers about possible wrongdoing. Although government employees have the same rights as other citizens to speak out on controversies of the day, they do not have the right to speak freely inside their offices on matters related to "their official duties," the Supreme Court said in a 5-4 decision. Lawyers for government whistle-blowers denounced the ruling as a major setback. "In an era of excessive government secrecy, the court has made it easier to engage in a government cover-up by discouraging internal whistle-blowing," said Steven Shapiro, legal director for the American Civil Liberties Union. The decision threw out most of a lawsuit filed by Deputy District Atty. Richard Ceballos, who said he was disciplined after he wrote memos alleging that a police officer may have lied to obtain a search warrant. The 9th U.S. Circuit Court of Appeals agreed he was entitled to a trial on his lawsuit because he had spoken on a "matter of public concern." But the Supreme Court reversed that ruling Tuesday. Because Tuesday's decision interprets the 1st Amendment, it applies to governments at all levels, including federal and states agencies, public hospitals and public schools and colleges.

Federal authorities are actively investigating dozens of American television stations for broadcasting items produced by the Bush administration and major corporations, and passing them off as normal news. Some of the fake news segments talked up success in the war in Iraq, or promoted the companies' products. Investigators from the Federal Communications Commission (FCC) are seeking information about stations across the country after a report produced...by the non-profit group Centre for Media and Democracy found that over a 10-month period at least 77 television stations were making use of the faux news broadcasts, known as Video News Releases (VNRs). Not one told viewers who had produced the items. The FCC has declined to comment on the investigation but investigators from the commission's enforcement unit recently approached Ms Farsetta for a copy of her group's report. Among items provided by the Bush administration to news stations was one in which an Iraqi-American in Kansas City was seen saying "Thank you Bush. Thank you USA" in response to the 2003 fall of Baghdad. The footage was actually produced by the State Department, one of 20 federal agencies that have produced and distributed such items. The FCC was urged to act by a lobbying campaign organised by Free Press, another non-profit group that focuses on media policy. More than 25,000 people [have] written to the FCC about the VNRs.

A working paper by John Mearsheimer, professor of political science at the University of Chicago, and Stephen Walt, professor of international affairs at the Kennedy School of Government at Harvard, called "The Israel Lobby" was printed in the London Review of Books...and all hell broke loose. For having the sheer effrontery to point out the painfully obvious -- that there is an Israel lobby in the United States -- Mearsheimer and Walt have been accused of being anti-Semitic, nutty and guilty of "kooky academic work." Of course there is an Israeli lobby in America. The American Israel Public Affairs Committee (AIPAC)...calls itself "America's Pro-Israel Lobby." In the United States, we do not have...full-throttle debate about Israel. Jews who criticize Israel are charmingly labeled "self-hating Jews." As I have often pointed out, that must mean there are a lot of self-hating Israelis, because those folks raise hell over their own government's policies all the time. It's...the vehemence of the attacks on anyone perceived as criticizing Israel that makes them so odious. Israel is the No. 1 recipient of American foreign aid, and it seems an easy case can be made that the United States has subjugated its own interests to those of Israel. Whether you agree or not, it is a discussion well worth having and one that should not be shut down before it can start by unfair accusations of "anti-Semitism."

The meetings of a secretive global think-tank would bring 100 of the world's most powerful and influential figures to Ottawa next month [for] deliberations on such weighty issues as the direction of global oil markets and potential military action against Iran. Reports circulating on the Internet say this year's Bilderberg Conference will be held June 8-11 at the Brookstreet Hotel - a rumour the hotel would not confirm. Patrice Basille, general manager of the Brookstreet Hotel, said no event associated with the Bilderberg group has been formally booked. "'What is the Bilderberg?" he asked. "This is the first I've heard about it." Journalists aren't allowed to attend the sessions, and staff at the host hotels are told not to confirm or deny any event is scheduled. But, if a gathering in Ottawa is anything like past Bilderbergs, invitees will be drawn from the pages of International Who's Who, with a emphasis on political and corporate leadership and strong representation of the oil and banking industries. The Bilderberg has been accused of being everything from a Zionist cabal building a single global government to a secret star-chamber that seeks to fix the price of oil and presidential elections. Even some rational critics suspect the Bilderberg's meetings set the economic and political agenda for much of the industrialized world without any public oversight or accountability. They denounce the Bilderberg as elitist and overly secretive, calling it an anti-democratic gathering of "the high priests of globalization."

Radio frequency identification keeps tabs on goods, services, pets - even people

2006-05-11, Sacramento Bee (the leading newspaper of California's capital city)

Feel like you're being followed? Maybe it's a tracking tag on your jeans or one implanted in a credit card. The tags are called radio frequency identification or RFIDs, and every day they are becoming more and more a part of our lifestyle. These Orwellian microchips, as minute as a grain of sand, identify and track products and even lost children at theme parks. They're being implanted in humans to alert hospitals about medical conditions. The tags can be so tiny, you may never know they are there. Retailers claim RFIDs are essential: alerting them when they're low on lipstick, air filters, sodas and other inventory. Embedded tags aren't so obvious. Hitachi Europe recently developed the world's tiniest RFID integrated circuit, small enough to be placed in a piece of paper. Some RFID chips are made to be imbedded in livestock, in pets and most recently in humans for a variety of reasons. RFID prices have dropped, and tagging has become practical for businesses. In-Stat, a high-tech research firm, reports more than 1 billion RFID chips were made last year and predicts that by 2010 the number will increase to 33 billion. Slightly larger than a grain of rice, RFID chips from VeriChip of Florida are manufactured for implanting in humans. The Food and Drug Administration approved human implants two years ago.

"The story was developing a momentum of its own, despite a virtual news blackout from the major media. Ultimately, public pressure forced the national newspapers into the fray. The Washington Post, the NY Times, and the LA Times published stories, but spent little time exploring the CIA's activities. Instead, my reporting became the focus. It was remarkable [my editor] Ceppos wrote, that the four Post reporters assigned to debunk the series "could not find a single significant factual error." A few months later, the Mercury News [due to intense CIA pressure] backed away from the story, publishing a long column by Ceppos apologizing for "shortcomings." The NY Times hailed Ceppos for "setting a brave new standard," and splashed his apology on their front page." (click
for more)

-- Pulitzer Prize winner Gary Webb, excerpted from landmark book Into The Buzzsaw

Fraudulent research regularly appears in the 30,000 scientific journals published worldwide, a former editor of the British Medical Journal (BMJ) said today. Even when journals discover that published research is fabricated or falsified they rarely retract the findings, according to Richard Smith, who was also chief executive of the BMJ publishing group. Writing in the latest edition of the Journal of the Royal Society of Medicine, Dr Smith called on editors to blow the whistle on bad research and to use their clout to pressure universities into taking action against dodgy researchers. The former BMJ editor said it was likely that research fraud was "equally common" in the 30,000 plus scientific journals across the globe but was "invariably covered up". His call for action comes in the wake of several high profile cases of fraudulent research, including the Korean scientist Hwang Woo-suk who fabricated stem cell research that it was claimed would open up new ways to treat diseases like Parkinson's. Dr Smith criticised the failure of scientific institutions, including universities, to discipline dodgy researchers even when alerted to problems by journals. "Few countries have measures in place to ensure research is carried out ethically," he said. "Most cases are not publicised. They are simply not recognised, covered up altogether or the guilty researcher is urged to retrain, move to another institution or retire from research."

The question puzzles and enrages a city: how is it that the Americans cannot keep the electricity running in Baghdad for more than a couple of hours a day, yet still manage to build themselves the biggest embassy on Earth? Irritation grows as residents deprived of air-conditioning and running water three years after the US-led invasion watch the massive US Embassy they call 'George W's palace' rising from the banks of the Tigris. In the pavement cafés, people moan that the structure is bigger than anything Saddam Hussein built. Officially, the design of the compound is supposed to be a secret, but you cannot hide the giant construction cranes and the concrete contours of the 21 buildings that are taking shape. Looming over the skyline, the embassy has the distinction of being the only big US building project in Iraq that is on time and within budget. In a week when Washington revealed a startling list of missed deadlines and overspending on building projects, Congress was told that the bill for the embassy was $592 million (Ł312 million).

"Conspiracy of Silence" is a powerful, disturbing documentary revealing a nationwide child abuse and pedophilia ring that leads to the highest levels of government. Featuring intrepid investigator John DeCamp, a highly decorated Vietnam war veteran and 16-year Nebraska state senator, "Conspiracy of Silence" reveals how rogue elements at all levels of government have been involved in systematic child abuse and pedophilia to feed the base desires of key politicians. Based on DeCamp's riveting book, The Franklin Cover-up, "Conspiracy of Silence" begins with the shut-down of Nebraska's Franklin Community Federal Credit Union after a raid by federal agencies in November 1988 revealed that $40 million was missing. When the Nebraska legislature launched a probe into the affair, what initially looked like a financial swindle soon exploded into a startling tale of drugs, money laundering, and a nationwide child abuse ring. Nineteen months later, the legislative committee's chief investigator died suddenly and violently, like more than a dozen other people linked to the Franklin case.

President George W. Bush [has] shown disdain and indifference for the US constitution by adopting an "astonishingly broad" view of presidential powers, a leading libertarian think-tank said. The critique from the Cato Institute reflects growing criticism by conservatives. "The pattern that emerges is one of a ceaseless push for power, unchecked by either the courts or Congress," the report...concludes. That view was echoed last week by former congressman Bob Barr, a Republican, who called on Congress to exercise "leadership by putting the constitution above party politics and insisting on the facts" in the debate over illegal domestic wiretapping. Senator Arlen Specter, chairman of the judiciary committee, noted: "Institutionally, the presidency is walking all over Congress." [Bush has] also cracked down on dissenters, with non-violent protesters being harassed by secret service agents whenever Mr Bush appears in public. The more serious charges concern Mr Bush's actions in the "war on terror". Citing a 1977 interview with President Richard Nixon, who said, "Well, when the president does it, that means it is not illegal", the report argues that the administration's...arguments for untrammelled executive power "comes perilously close to that view".

[April 10, 2006] The U.S. military is conducting a propaganda campaign to magnify the role of the leader of al-Qaeda in Iraq, according to internal military documents. The effort has raised his profile in a way that some military intelligence officials believe may have...helped the Bush administration tie the war to...Sept. 11. Although Zarqawi and other foreign insurgents in Iraq have conducted deadly bombing attacks, they remain "a very small part of the actual numbers," [said] Col. Derek Harvey, who...was one of the top officers handling Iraq intelligence issues on the staff of the Joint Chiefs of Staff. "Our own focus on Zarqawi has enlarged his caricature...made him more important than he really is." One briefing slide about U.S. "strategic communications" in Iraq, prepared for Army Gen. George W. Casey Jr., the top U.S. commander in Iraq, describes the "home audience" as one of six major targets of the American side of the war. There were direct military efforts to use the U.S. media to affect views of the war. One slide in the same briefing, for example, noted that a "selective leak" about Zarqawi was made to Dexter Filkins, a New York Times reporter. Filkins's resulting article...ran on the Times front page. U.S. propaganda efforts in Iraq in 2004 cost $24 million. "Villainize Zarqawi" one U.S. military briefing from 2004 stated. It listed..."PSYOP," the U.S. military term for propaganda work. One internal briefing, produced by the U.S. military headquarters in Iraq, said..."The Zarqawi PSYOP program is the most successful information campaign to date."

For 2,000 years Judas has been reviled for betraying Jesus. Now a newly translated ancient document seeks to tell his side of the story. The "Gospel of Judas"...portrays Judas as a favored disciple who was given special knowledge by Jesus -- and who turned him in at Jesus' request. The text, one of several ancient documents found in the Egyptian desert in 1970, was preserved and translated by a team of scholars. It was made public in an English translation by the National Geographic Society. A "Gospel of Judas" was first mentioned around 180 A.D. by Bishop Irenaeus of Lyon, in what is now France. The bishop denounced the manuscript as heresy because it differed from mainstream Christianity. The actual text had been thought lost until this discovery. Christianity in the ancient world was much more diverse than it is now, with a number of gospels circulating in addition to the four that were finally collected into the New Testament, noted Bart Ehrman, chairman of religious studies at the University of North Carolina. Eventually, one point of view prevailed and the others were declared heresy, he said, including the Gnostics who believed that salvation depended on secret knowledge that Jesus imparted.The newly translated document's text begins: "The secret account of the revelation that Jesus spoke in conversation with Judas Iscariot."

The line between living organisms and machines has just become a whole lot blurrier. European researchers have developed "neuro-chips" in which living brain cells and silicon circuits are coupled together. The achievement could one day enable...the development of organic computers that crunch numbers using living neurons. To create the neuro-chip, researchers squeezed more than 16,000 electronic transistors and hundreds of capacitors onto a silicon chip just 1 millimeter square in size. They used special proteins found in the brain to glue brain cells, called neurons, onto the chip. However, the proteins acted as more than just a simple adhesive. "They also provided the link between ionic channels of the neurons and semiconductor material in a way that neural electrical signals could be passed to the silicon chip," said study team member Stefano Vassanelli from the University of Padua in Italy. The proteins allowed the neuro-chip's electronic components and its living cells to communicate with each other.

The FBI, while waging a highly publicized war against terrorism, has spent resources gathering information on antiwar and environmental protesters and on activists who feed vegetarian meals to the homeless, the agency's internal memos show. For years, the FBI's definition of terrorism has included violence against property. That definition has led FBI investigations to online discussion boards, organizing meetings and demonstrations of a wide range of activist groups. The FBI's encounters with activists are described in hundreds of pages of documents obtained by the American Civil Liberties Union under the Freedom of Information Act after agents visited several activists before the 2004 political conventions. ACLU attorneys acknowledge that the FBI memos are heavily redacted and contain incomplete portraits of some cases. Still, the attorneys say, the documents show that the FBI has monitored groups that were not suspected of any crime. FBI officials respond that there is nothing improper about agents attending a meeting or demonstration.

The idea of a powerful "Jewish lobby" that has its gnarled fingers in the machinery of the government is an old and repugnant canard. In the modern era, even to broach the idea of a "Jewish lobby" is unacceptable. It's just not done in polite society -- even in situations in which there's some truth to it. That's why it was a bit of a shock last week when a 12,000-word article by two eminent professors -- Stephen Walt, the academic dean of Harvard University's John F. Kennedy School of Government, and John Mearsheimer, a professor of political science at the University of Chicago -- appeared in the London Review of Books under the title "The Israel Lobby." According to the two academics, the United States' "unwavering support" for Israel -- including the $3 billion a year we give in direct assistance -- is justified by neither strategic nor moral imperatives. Despite the common view, Israel is, in fact, the Goliath in the Middle East, not the David. It is...an avowedly Jewish state in which Arabs live as second-class citizens. "The bottom line is that AIPAC, a de facto agent for a foreign government, has a stranglehold on Congress," Walt and Mearsheimer contend. Public reaction has varied. Harvard has reportedly distanced itself from the original report. It seems silly to deny that a powerful lobby on behalf of Israel exists. The real question is how pernicious it is. My advice is to judge for yourself. The full article is available at http://www.lrb.co.uk/v28/n06/mear01_.html

Pentagon scientists are planning to turn sharks into "stealth spies" capable of tracking vessels undetected, a British magazine has reported. They want to remotely control the sharks by implanting electrodes in their brains, The New Scientist says. It says the aim is "to exploit sharks' natural ability to glide through the water, sense delicate electrical gradients and follow chemical trails". The research is being funded by the Pentagon's Defence Advanced Research Projects Agency (DARPA). It aims to build on latest developments in brain implant technology which has already seen scientists controlling the movements of fish, rats and monkeys. Such devices are already being used by scientists at Boston University to "steer" a spiny dogfish in a fish tank. The next step for the Pentagon scientists will be the release of blue sharks with similar devices into the ocean off the coast of Florida. Remote-controlled sharks...have advantages that robotic underwater surveillance vehicles just cannot match: they are silent, and they power themselves.

An Ohio company has embedded silicon chips in two of its employees - the first known case in which US workers have been "tagged" electronically as a way of identifying them. A private video surveillance company said it was testing the technology as a way of controlling access to a room where it holds security video footage for government agencies and the police. Embedding slivers of silicon in workers is likely to add to the controversy over RFID technology, widely seen as one of the next big growth industries. RFID chips – inexpensive radio transmitters that give off a unique identifying signal – have been implanted in pets or attached to goods so they can be tracked in transit. "There are very serious privacy and civil liberty issues of having people permanently numbered," said Liz McIntyre, who campaigns against the use of identification technology. "There's nothing pulsing or sending out a signal," said Mr Darks, who has had a chip in his own arm. "It's not a GPS chip. My wife can't tell where I am." The technology's defenders say it is acceptable as long as it is not compulsory. But critics say any implanted device could be used to track the "wearer" without their knowledge.

Three judges emerged after years of secret deliberation to rule that Europe had imposed a de facto ban on GM [genetically modified] food imports between 1999 and 2003, violating WTO rules. The court also ruled that Austria, France, Germany, Greece, Italy and Luxembourg had no legal grounds to impose their own unilateral import bans. Actually, the judges said much more, but in true WTO style no one has been allowed to know what. A few bureaucrats in the US, EU, Argentina and Canada have reportedly seen the full 1,045-page report, and an edited summary of some of its conclusions has been leaked. But no one, it seems, will take responsibility for the ruling, which may force the EU to pay hundreds of millions of dollars to compensate some of the world's most heavily subsidised farmers, and could change the laws of at least six countries that have imposed GM bans. It is now clear that the real reason the US took Europe to the WTO court was...to make it easier for its companies to...open regulatory doors in China, India, south-east Asia, Latin America and Africa, where most US exports now go. This is where millions of tonnes of US food aid heads, and where US GM companies are desperate to have access, buying up seed companies and schmoozing presidents.

When Dr. Morando Soffritti ... saw the results of his team's seven-year study on aspartame, he knew he was about to be injected into a bitter controversy over this sweetener. Aspartame is sold under the brand names Nutra-Sweet and Equal and is found in such popular products as Diet Coke, Diet Pepsi, Diet Snapple and Sugar Free Kool-Aid. Hundreds of millions of people consume it worldwide. Dr. Soffritti ... oversees 180 scientists and researchers in 30 countries. Dr. Soffritti's study concluded that [aspartame] was associated with unusually high rates of lymphomas, leukemias and other cancers.The study ... involved 1,900 laboratory rats and cost $1 million. Soffritti said he was inspired to look at aspartame because of what he calls "inadequacies" in the cancer studies done by Searle in the 1970's. Others have also challenged Searle's studies. Years before the F.D.A. approved aspartame, the agency had serious concerns about the accuracy and credibility of Searle's aspartame studies. From 1977 to 1985 -- during much of the approval process -- Searle was headed by Donald H. Rumsfeld, who is now the secretary of defense. Searle was acquired by Monsanto in 1985. Dr. Soffritti said ... more research and open debate were needed on whether aspartame was a carcinogen. "It is very important to have scientists who are independent and not funded by industry looking at this."

Note: If you want to understand the influence of big money on your health, this article is well worth reading. Our Health Information Center Health Information Center has lots more. And for an excellent, incredibly eye-opening documentary on aspartame that will raise more questions about diet soft drinks, click here.

There is increasing military interest in the development of techniques that can survey and possibly manipulate the mental processes of potential enemies, or enhance the potential of one's own troops. There is nothing new about such an interest. In the US, it stretches back at least half a century. Impressed by claims that the Soviet Union was developing psychological warfare, the CIA and the Defence Advanced Projects Agency (Darpa) began their own programmes. Early experiments included the clandestine feeding of LSD to their own operatives and attempts at 'brain-washing'. By the 1960s, Darpa, along with the US Navy, was funding almost all US research into 'artificial intelligence', in order to develop methods and technologies for the 'automated battlefield' and the 'intelligent soldier'. Contracts were let and patents taken out on techniques aimed at recording signals from the brains of enemy personnel at a distance, in order to 'read their minds'. These efforts have burgeoned in the aftermath of the so-called 'war on terror'. The step beyond reading thoughts is to attempt to control them directly. A new technique - transcranial magnetic stimulation (TMS) - has begun to generate interest. This focuses an intense magnetic field on specific brain regions, and has been shown to affect thoughts, perceptions and behaviour.

The Army Corps of Engineers has awarded a contract worth up to $385 million for building temporary immigration detention centers to Kellogg Brown & Root, the Halliburton subsidiary that has been criticized for overcharging the Pentagon for its work in Iraq. KBR would build the centers for the Homeland Security Department for an unexpected influx of immigrants, to house people in the event of a natural disaster or for new programs that require additional detention space, company executives said. Officials of the corps said that they had solicited bids and that KBR was the lone responder. A spokesman for the corps, Clayton Church, said that the centers could be at unused military sites or temporary structures and that each one would hold up to 5,000 people. A spokeswoman for Immigration and Customs Enforcement, Jamie Zuieback...added that she could not provide additional information about the company's statement that the contract was also meant to support the rapid development of new programs.

Note: For lots more on disturbing potential uses for these detention centers, click here. And for a revealing 2002 Los Angeles Times articled title "Camps for Citizens,"click here.

The Pentagon has its own domestic spying program. Even its leaders say the outfit may have gone too far. Late on a June afternoon in 2004, a motley group of about 10 peace activists showed up outside the Houston headquarters of Halliburton, the giant military contractor once headed by Vice President Dick Cheney. The demonstrators wore papier-mache masks and handed out free peanut-butter-and-jelly sandwiches to Halliburton employees as they left work. The idea, according to organizer Scott Parkin, was to call attention to allegations that the company was overcharging on a food contract for troops in Iraq. To U.S. Army analysts at the top-secret Counterintelligence Field Activity (CIFA), the peanut-butter protest was regarded as a potential threat to national security. A Defense document shows that Army analysts wrote a report on the Halliburton protest and stored it in CIFA's database. There are now questions about whether CIFA exceeded its authority and conducted unauthorized spying on innocent people and organizations. The deputy Defense secretary now acknowledges that...reports may have contained information on U.S. citizens and groups that never should have been retained. The number of reports with names of U.S. persons could be in the thousands, says a senior Pentagon official.

A newly declassified document gives a fascinating glimpse into the US military's plans for "information operations". The declassified document is called "Information Operations Roadmap". It was obtained by the National Security Archive at George Washington University using the Freedom of Information Act. Officials in the Pentagon wrote it in 2003. The Secretary of Defense, Donald Rumsfeld, signed it. The operations described in the document include a surprising range of military activities: public affairs officers who brief journalists, psychological operations troops who try to manipulate the thoughts and beliefs of an enemy, computer network attack specialists who seek to destroy enemy networks. The military's psychological operations, or Psyops, is finding its way onto the computer and television screens of ordinary Americans. "Psyops messages will often be replayed by the news media for much larger audiences, including the American public. Strategy should be based on the premise that the Department [of Defense] will 'fight the net' as it would an enemy weapons system," it reads. The document recommends that the United States should seek the ability to "provide maximum control of the entire electromagnetic spectrum". US forces should be able to "disrupt or destroy the full spectrum of globally emerging communications systems, sensors, and weapons systems dependent on the electromagnetic spectrum". The fact that the "Information Operations Roadmap" is approved by the Secretary of Defense suggests that these plans are taken very seriously indeed in the Pentagon.

Note: For other revealing news articles on military corruption, click here. For other revealing news articles on government corruption, click here.

Using M.R.I. scanners, neuroscientists have now tracked what happens in the politically partisan brain when it tries to digest damning facts about favored candidates or criticisms of them. The process is almost entirely emotional and unconscious, the researchers report, and there are flares of activity in the brain's pleasure centers when unwelcome information is being rejected. Researchers have long known that political decisions are strongly influenced by unconscious emotional reactions, a fact routinely exploited by campaign consultants and advertisers. But the new research suggests that for partisans, political thinking is often predominantly emotional. It is possible to override these biases, Dr. Westen said, "but you have to engage in ruthless self reflection, to say, 'All right, I know what I want to believe, but I have to be honest.' " He added, "It speaks to the character of the discourse that this quality is rarely talked about in politics."

KBR Awarded DHS Contingency Support Project for Emergency Support Services

KBR [Kellogg, Brown, and Root] announced today that the Department of Homeland Security's (DHS) U.S. Immigration and Customs Enforcement (ICE) component has awarded KBR an Indefinite Delivery/Indefinite Quantity (IDIQ) contingency contract to support ICE facilities in the event of an emergency. KBR is the engineering and construction subsidiary of Halliburton. The competitively awarded contract [has] a maximum total value of $385 million over a five-year term. The contract, which is effective immediately, provides for establishing temporary detention and processing capabilities...in the event of an emergency influx of immigrants into the U.S., or to support the rapid development of new programs. The contract may also provide migrant detention support to other U.S. Government organizations in the event of an immigration emergency, as well as the development of a plan to react to a national emergency, such as a natural disaster.

Note: $385 million more is channeled to Vice President Dick Cheney's Halliburton to build more prisons to possibly support the rapid development of new programs. What might those new programs be?

Russell Tice, a longtime insider at the National Security Agency, is now a whistleblower the agency would like to keep quiet. For 20 years, Tice worked in the shadows. "I specialized in what's called special access programs," Tice said of his job. "We called them 'black world' programs and operations." Some of those secret "black world" operations run by the NSA were operated in ways that he believes violated the law. He is prepared to tell Congress all he knows. Tice says the technology exists to track and sort through every domestic and international phone call...and to search for key words or phrases that a terrorist might use. Tice...says the number of Americans subject to eavesdropping by the NSA could be in the millions if the full range of secret NSA programs is used. "For most Americans [who] placed an overseas communication, more than likely they were sucked into that vacuum." He told ABC News that he was a source for the [New York] Times. But Tice maintains that his conscience is clear. "We need to clean up the intelligence community. We've had abuses, and they need to be addressed." The NSA revoked Tice's security clearance in May of last year based on what it called psychological concerns and later dismissed him. Tice calls that bunk and says that's the way the NSA deals with troublemakers and whistleblowers.

With a wave of his hand, Amal Graafstra, a 29-year-old entrepreneur based in Vancouver, Canada, opens his front door. With another, he logs onto his computer. Tiny radio frequency identification (RFID) computer chips inserted into Graafstra's hands make it all possible. The computer chips, which cost about $2, interact with a device installed in computers and other electronics. The chips are activated when they come within 3 inches of a so-called reader, which scans the data on the chips. The "reader" devices are available for as little as $50. Graafstra said at least 20 of his tech-savvy pals have RFID implants. "I can't feel it at all. It doesn't impede me. It doesn't hurt at all. I almost can't tell it's there," agreed Jennifer Tomblin, a 23-year-old marketing student and Graafstra's girlfriend. Mikey Sklar, a 28-year-old Brooklyn resident, said, "It does give you some sort of power of 'Abracadabra,' of making doors open and passwords enter just by a wave of your hand." The RFID chip in Sklar's hand, which is smaller than a grain of rice and can last up to 100 years, was injected by a surgeon in Los Angeles.

In a clumsy effort to sabotage Iran's nuclear program, the CIA in 2004 intentionally handed Tehran some top-secret bomb designs laced with a hidden flaw that U.S. officials hoped would doom any weapon made from them. But the Iranians were tipped to the scheme by the Russian defector hired by the CIA to deliver the plans and may have gleaned scientific information useful for designing a bomb, writes New York Times reporter James Risen in "State of War." Two nuclear weapons experts...added that a deliberate flaw in the plans could have been easily found by the Iranians. The New York Times delayed for a year publication of its article on the NSA's domestic spying, in part because of personal requests from the president. Critics have questioned whether the paper could have published the information before last year's presidential election if it had decided against a delay. Newspaper officials have refused to comment on reasons for the delay or on the exact timing. Top New York Times officials also refused to publish a news article about the reported CIA plot to give intentionally flawed nuclear plans to Iran, according to a person briefed on the newspaper's conversations by one of the participants. That person said the New York Times withheld publication at the request of the White House and former CIA Director George J. Tenet.

Troops conducting urban operations soon will have the capabilities of superheroes, being able to sense through 12 inches of concrete to determine if someone is inside a building. The new "Radar Scope" will give warfighters searching a building the ability to tell within seconds if someone is in the next room. By simply holding the portable, handheld device up to a wall, users will be able to detect movements as small as breathing. The Radar Scope, developed by DARPA, is expected to be fielded to troops in Iraq as soon as this spring. Weighing just a pound and a half, the Radar Scope will be about the size of a telephone handset and cost just about $1,000, making it light enough for a soldier to carry and inexpensive enough to be fielded widely. The Radar Scope will be waterproof and rugged, and will run on AA batteries.

Deep in a remote, fog-layered hollow near Sugar Grove, W.Va., hidden by fortress-like mountains, sits the country's largest eavesdropping bug. The station's large parabolic dishes secretly and silently sweep in millions of private telephone calls and e-mail messages an hour. Run by the ultrasecret National Security Agency, the listening post intercepts all international communications entering the eastern United States. Another N.S.A. listening post, in Yakima,Wash., eavesdrops on the western half of the country. According to John E. McLaughlin, who as the deputy director of the Central Intelligence Agency in the fall of 2001 was among the first briefed on the program, this eavesdropping was the most secret operation in the entire intelligence network, complete with its own code word - which itself is secret. Jokingly referred to as "No Such Agency," the N.S.A. was created in absolute secrecy in 1952 by President Harry S. Truman. But the agency is still struggling to adjust to the war on terror. At home, it increases pressure on the agency to bypass civil liberties and skirt formal legal channels of criminal investigation. Originally created to spy on foreign adversaries, the N.S.A. was never supposed to be turned inward.

Note: Don't miss the amazing article on Operation Northwoods by the author of this article, former ABC producer James Bamford. It details the 1962 plans of the Pentagon chiefs to foment terrorism in the US as a pretext for war with Cuba. See http://www.WantToknow.info/010501operationnorthwoods

The National Security Agency has kept secret since 2001 a finding by an agency historian that during the Tonkin Gulf episode, which helped precipitate the Vietnam War, N.S.A. officers deliberately distorted critical intelligence to cover up their mistakes. The historian's conclusion is the first serious accusation that communications intercepted by the N.S.A., the secretive eavesdropping and code-breaking agency, were falsified so that they made it look as if North Vietnam had attacked American destroyers on Aug. 4, 1964, two days after a previous clash. President Lyndon B. Johnson cited the supposed attack to persuade Congress to authorize broad military action in Vietnam, but most historians have concluded in recent years that there was no second attack. The N.S.A. historian, Robert J. Hanyok, found a pattern of translation mistakes that went uncorrected, altered intercept times and selective citation of intelligence that persuaded him that midlevel agency officers had deliberately skewed the evidence. Mr. Hanyok's findings were published nearly five years ago in a classified in-house journal, and starting in 2002 he and other government historians argued that it should be made public. But their effort was rebuffed by higher-level agency policymakers, according to an intelligence official. The intelligence official said the evidence for deliberate falsification is "about as certain as it can be."

In his 18 years as chairman of the Federal Reserve, Greenspan has occasionally drawn criticism, but no one disputes his technical prowess or sniffs at his track record of low inflation and steady, almost uninterrupted growth. Enter Ben S. Bernanke, President Bush's nominee to take Greenspan's place. The former Princeton economics professor is currently the chairman of the president's Council of Economic Advisers. The following are excerpts from [a speech] by Ben S. Bernanke. "On Milton Friedman's Ninetieth Birthday," Nov. 8, 2002: "I first read 'A Monetary History of the United States' early in my graduate school years at M.I.T. I was hooked, and I have been a student of monetary economics and economic history ever since. Friedman and [his co-author Anna J.] Schwartz made the case that the economic collapse of 1929-33 was the product of the nation's monetary mechanism gone wrong. What I take from their work is the idea that monetary forces, particularly if unleashed in a destabilizing direction, can be extremely powerful. "I would like to say to Milton and Anna: Regarding the Great Depression. You're right, we did it. We're very sorry. But thanks to you, we won't do it again."

Note: The chairman of the Federal Reserve Board admits here that the Federal Reserve caused the Great Depression. The Federal Reserve is owned by powerful private banks. It was created in 1913 largely in secrecy and fought by many who understood the dangers involved. For more reliable information on this, click here.

Drafting a plan for global dominance. Few writers are more ambitious than the writers of government policy papers, and few policy papers are more ambitious than Dick Cheney's masterwork. It has taken several forms over the last decade and is in fact the product of several ghostwriters (notably Paul Wolfowitz and Colin Powell), but Cheney has been consistent in his dedication to the ideas in the documents that bear his name, and he has maintained a close association with the ideologues behind them. Let us, therefore, call Cheney the author, and this series of documents the Plan. The Plan was published in unclassified form most recently under the title of Defense Strategy for the 1990s, as Cheney ended his term as secretary of defense under the elder George Bush in early 1993. The Plan is for the United States to rule the world. The overt theme is unilateralism, but it is ultimately a story of domination. It calls for the United States to maintain its overwhelming military superiority and prevent new rivals from rising up to challenge it on the world stage. It calls for dominion over friends and enemies alike. It says not that the United States must be more powerful, or most powerful, but that it must be absolutely powerful. The Plan is disturbing in many ways, and ultimately unworkable. Yet it is being sold now as an answer to the 'new realities' of the post-September 11 world, even as it was sold previously as the answer to the new realities of the post-Cold War world. For Cheney, the Plan has always been the right answer, no matter how different the questions.

A powerful coalition of judges, senior lawyers and politicians has warned that the Government is undermining freedoms citizens have taken for granted for centuries and that Britain risks drifting towards a police state. One of the country's most eminent judges has said that undermining the independence of the courts has frightening parallels with Nazi Germany. Senior legal figures are worried that "inalienable rights" could swiftly disappear unless Tony Blair ceases attacking the judiciary and freedoms enshrined in the Human Rights Act.

The first annual National Security Whistleblowers Conference...has to be one of the more unusual gatherings of intelligence veterans in recent years. The nearly 20 current or former officials from the FBI, CIA, Defense Intelligence Agency, and even the supersecret National Security Agency who make up the core of the conference share an unusual distinction: They are all deeply out of favor with their longtime employers. Most cannot discuss the allegations they are making in detail because the specifics are highly classified. The agencies they work for also refuse to answer questions. The current and former officials at the conference said that today's climate in Washington has never been worse for whistleblowers. One of the biggest names of the conference never even uttered a word. Lt. Col. Anthony Shaffer is the military intelligence operative who...went public with a controversial claim that a year before September 11, his top-secret task force "Able
Danger" was able to identify the man who later turned out to be the lead hijacker [on 9/11]. Shaffer was slated to speak but instead sat quietly by as his lawyer, Mark Zaid, spoke for him. "Tony is not allowed to talk," Zaid said. "He is gagged from talking to Congress." The conference was organized by Sibel Edmonds, a former FBI translator who was pushed out of the bureau after raising accusations of wrongdoing by other FBI translators. She has been barred from discussing the details of her case by the FBI. She created the National Security Whistleblowers Coalition www.nswbc.org to bring whistleblowers like her together to push for legal reforms.

Note: For a detailed article in Vanity Fair on Sibel Edmonds' courageous efforts to expose the truth, click here. For the whistleblowing action which drew international media attention by WantToKnow.info founder Fred Burks, click here.

If the nightmare of an avian flu pandemic emerges from the dark chapters of doomsday scenarios, it will fall to the Department of the Homeland Security, not the medical establishment, to manage the crisis, according to federal documents and interviews with government officials. Under the National Response Plan, which also plans for actions in case of pandemics, DHS assumes top authority when an “incident of national significance” is declared. The first such “incident of national significance” was declared in August after Hurricane Katrina hit; however, federal coordination among agencies and state and local governments broke down on so many levels that even President Bush was forced to acknowledge that the plan was flawed. Federal officials have been role playing different flu outbreak scenarios for the past several months. Last year’s plan called for closing of schools, restricting travel and...lock-down quarantine measures. Those extreme measures jumped into the spotlight...when President Bush suggested that federal military troops -- not just the National Guard -- may have to be called in to enforce a quarantine.

Note: Isn't it interesting how the government seems to be predicting that the avian flu, which has killed less than 100 people worldwide, is going to mutate and cause massive deaths? How do they know this? Could this be another way of pushing us into fear and giving up our civil liberties?

Secrecy has been perhaps the most consistent trait of the George W. Bush presidency. Whether it involves refusing to provide the names of oil executives who advised Vice President Dick Cheney on energy policy, prohibiting photographs of flag-draped coffins returning from Iraq, or forbidding the release of files pertaining to Chief Justice John Roberts...President Bush seems determined to control what the public is permitted to know. Perhaps the most egregious example occurred on Nov. 1, 2001, when President Bush signed Executive Order 13233, under which a former president's private papers can be released only with the approval of both that former president (or his heirs) and the current one. Before that executive order, the National Archives had controlled the release of documents under the Presidential Records Act of 1978, which stipulated that all papers, except those pertaining to national security, had to be made available 12 years after a president left office. Now, however, Mr. Bush can prevent the public from knowing not only what he did in office, but what Bill Clinton, George H. W. Bush and Ronald Reagan did in the name of democracy. The best interests of the nation are at stake. As the American Political Science Association, one plaintiff in the federal lawsuit, put it: "The only way we can improve the operation of government, enhance the accountability of decision-makers and ultimately help maintain public trust in government is for people to understand how it worked in the past."

Federal health officials are still testing the samples from air sensors on the Mall and in downtown Washington that collected a small amount of the tularemia agent. Health officials in the Washington area were notified Friday that the filters on biohazard sensors that make up the BioWatch network detected the bacteria Sept. 24, when tens of thousands of people were on the Mall for antiwar demonstrations. The naturally-occurring biological agent -- which is on the "A list" of the Department of Homeland Security's biohazards, along with anthrax, plague and smallpox -- was detected in small amounts. Detection of the bacteria turned into an incident with nationwide implications, because thousands of protesters had come from throughout the country. Police said that more than 100,000 people attended the rally; organizers put the figure at 300,000.

Note: Isn't it interesting that this very rare occurrence coincided perfectly with a huge antiwar demonstration?

How much influence do private networks of the rich and powerful have on government policies and international relations? One group, the Bilderberg, has often attracted speculation that it forms a shadowy global government. Every year since 1954 [they have brought] together about 120 leading business people and politicians. At this year's meeting in Germany, the audience included the heads of the World Bank and European Central Bank, Chairmen or Chief Executives from Nokia, BP, Unilever, DaimlerChrysler and Pepsi ... editors from five major newspapers, members of parliament, ministers, European commissioners ... and the queen of the Netherlands. The chairman ... is 73-year-old Viscount Etienne Davignon. In an extremely rare interview, he played down the importance of Bilderberg. "I don't think (we are) a global ruling class because I don't think a global ruling class exists." Will Hutton ... who attended a Bilderberg meeting in 1997, says people take part in these networks in order to influence the way the world works, to create what he calls "the international common sense". And that "common sense" is one which supports the interests of Bilderberg's main participants. For Bilderberg's critics the fact that there is almost no publicity about the annual meetings is proof that they are up to no good. Bilderberg meetings often feature future political leaders shortly before they become household names. Bill Clinton went in 1991 while still governor of Arkansas, Tony Blair was there two years later while still an opposition MP. All the recent presidents of the European Commission attended Bilderberg meetings before they were appointed. Informal and private networks like Bilderberg have helped to oil the wheels of global politics and globalisation for the past half a century.

Note: Why is this meeting of top world leaders kept so secret? Why, until a few years ago, was there virtually no reporting on this influential group in the major media? Thankfully, the alternative media has had some good articles. And a Google search can be highly informative. Explore many other revealing major media news articles on powerful secret societies. And for those interested, check out reliable, eye-opening information covering the big picture of how and why these secret societies are using government-sponsored mind control programs to achieve their agenda.

Scott Stevens is...the face of the weather at KPVI News Channel 6. The Pocatello native made his final Channel 6 forecast Thursday night, leaving a job he's held for nine years in order to pursue his weather theories on a full-time basis. Since Katrina, Stevens has been in newspapers across the country. On Wednesday, Stevens was interviewed by Fox News firebrand Bill O'Reilly. Stevens said he received 30 requests to do radio interviews on Thursday alone. Although the theories espoused by Stevens - scalar weapons, global dimming - are definitely on the scientific fringe today, there are thousands of Web sites that mention such phenomena. "The Soviets boasted of their geoengineering capabilities; these impressive accomplishments must be taken at face value simply because we are observing weather events that simply have never occurred before, never!" Stevens wrote on his Web site. To learn more about Stevens and his thoughts on manipulated weather, check out his Web site at www.weatherwars.info, or go to www.journalnet.com/articles/2005/03/06/opinion/opinion04.txt.

The men from Blackwater USA arrived in New Orleans right after Katrina hit. The company known for its private security work guarding senior U.S. diplomats in Iraq beat the federal government and most aid organizations to the scene. About 150 heavily armed Blackwater troops dressed in full battle gear spread out into the chaos of New Orleans. When asked what authority they were operating under, one guy said, "We're on contract with the Department of Homeland Security." Then, pointing to one of his comrades, he said, "He was even deputized by the governor of the state of Louisiana. We can make arrests and use lethal force if we deem it necessary." Says Michael Ratner, president of the Center for Constitutional Rights, "These private security forces have behaved brutally, with impunity, in Iraq. To have them now on the streets of New Orleans is frightening and possibly illegal." Blackwater is operating under a federal contract...[that] was announced just days after Homeland Security Department spokesperson Russ Knocke told the Washington Post he knew of no federal plans to hire Blackwater. With President Bush using the Katrina disaster to try to repeal Posse Comitatus (the ban on using U.S. troops in domestic law enforcement)...the war is coming home in yet another ominous way. As one Blackwater mercenary said, "This is a trend. You're going to see a lot more guys like us in these situations."

Louisiana's top hurricane experts have rejected the official explanations for the floodwall collapses that inundated much of New Orleans, concluding that Hurricane Katrina's storm surges were much smaller than authorities have suggested and that the city's flood-protection system should have kept most of the city dry. With the help of complex computer models and stark visual evidence, scientists and engineers at Louisiana State University's Hurricane Center have concluded that Katrina's surges did not come close to overtopping those barriers. That would make faulty design, inadequate construction or some combination of the two the likely cause of the breaching of the floodwalls. Ivor van Heerden, the Hurricane Center's deputy director, said the real scandal of Katrina is the "catastrophic structural failure" of barriers that should have handled the hurricane with relative ease. "We are absolutely convinced that those floodwalls were never overtopped," said van Heerden. On a tour Tuesday, researchers...showed a "debris line" that indicates the top height of Katrina's waves was at least four feet below the crest of Lake Pontchartrain's levees. They contended that the pattern of destruction behind the breaches was consistent with a localized "pressure burst," rather than widespread overtopping. Former representative Bob Livingston, (R-La.)...noted that the earthen levees along Lake Pontchartrain had all held, while concrete floodwalls had failed. He was especially concerned about the 17th Street barrier, saying it "shouldn't have broken." If Katrina did not exceed the design capacity of the New Orleans levees, the federal government may bear ultimate responsibility for this disaster.

Former CBS News anchor Dan Rather said Monday that there is a climate of fear running through newsrooms stronger than he has ever seen in his more than four-decade career. Rather famously tangled with President Nixon and his aides during the Watergate years while Rather was a hard-charging White House correspondent. He said that in the intervening years, politicians "of every persuasion" had gotten better at applying pressure on the conglomerates that own the broadcast networks. He called it a "new journalism order." He said this pressure -- along with the "dumbed-down, tarted-up" coverage, the advent of 24-hour cable competition and the chase for ratings and demographics -- has taken its toll on the news business. "All of this creates a bigger atmosphere of fear in newsrooms," Rather said.

The dire conditions created by Hurricane Katrina may be confined to the Gulf Coast, but on paper the emergency is all over the country. President Bush has declared that Katrina-related emergencies exist in 40 states and the District of Columbia. Some, such as California, Massachusetts and North Dakota, are far removed from Katrina's wrath. Apparently it does not take much to qualify as an emergency.

Note:
These "emergencies" also give the president extraordinary powers
to curtail civil liberties.

The dire conditions
created by Hurricane Katrina may be confined to the Gulf Coast, but on paper
the emergency is all over the country. President Bush has declared that Katrina-related
emergencies exist in 40 states and the District of Columbia. Apparently it
does not take much to qualify as an emergency.

Note:
These "emergencies" also give the president extraordinary powers
to curtail civil liberties.

Jose Padilla, who was born in New York and grew up in Chicago, landed at O'Hare airport more than three years ago and hasn't been seen since. He disappeared into a succession of jails and military prisons without being charged with a crime, without trial and without even a hearing on the allegations against him. In a ruling that puts the liberties of every citizen at risk, a federal appeals court said Friday there's nothing wrong with that. Worse, the ruling -- expected to be appealed -- isn't limited to O'Hare airport or to Padilla. The court said Congress has given the president authority to order the jailing of anyone anywhere for as long as he wishes, as long as he claims it's connected to the war on terrorism. That sounds more like the power accorded a dictator than the president of the United States. Repeal of the Constitution's Fourth, Fifth and Sixth amendments wasn't part of the package when Congress passed that anti-terrorism resolution after the 9/11 attacks.

For those who
are ready to go even deeper, read about FEMA's shady beginnings by clicking here. Then, to see Online Journal's revealing analysis article "New Orleans: Dress rehearsal for lockdown of America," click here.

The Pentagon has drafted a revised doctrine for the use of nuclear weapons that envisions commanders requesting presidential approval to use them to preempt an attack by a nation or a terrorist group using weapons of mass destruction. The draft also includes the option of using nuclear arms to destroy known enemy stockpiles of nuclear, biological or chemical weapons. The draft, dated March 15, would provide authoritative guidance for commanders to request presidential approval for using nuclear weapons, and represents the Pentagon's first attempt to revise procedures to reflect the Bush preemption doctrine. The first example for potential nuclear weapon use listed in the draft is against an enemy that is using "or intending to use WMD" against U.S. or allied, multinational military forces or civilian populations.

The government is withholding more information than ever from the public and expanding ways of shrouding data. Last year, federal agencies spent a record $148 creating and storing new secrets for each $1 spent declassifying old secrets, a coalition of watchdog groups reported Saturday. In the late 1990s, the ratio was $15-$17 a year to $1, according to the secrecy report card by OpenTheGovernment.org. Overall, the government spent $7.2 billion in 2004 stamping 15.6 million documents "top secret," "secret" or "confidential." That almost doubled the 8.6 million new documents classified as recently as 2001. Last year, the number of pages declassified declined for the fourth straight year to 28.4 million. In 2001, 100 million pages were declassified; the record was 204 million pages in 1997. These figures cover 41 federal agencies, excluding the CIA, whose classification totals are secret. The report also noted the growing use of secret searches, court secrecy, closed meetings by government advisory groups and patents kept from public view. J. William Leonard, director of the National Archives' Information Security Oversight Office,...said, "the great lesson of 9-11 is that improper hoarding of information can cost lives and harm national security."

The Government is creating a system of "mass public surveillance" capable of tracking every adult in Britain without their consent, MPs say. They warn that people who have never committed a crime can be "electronically monitored" without their knowledge. Biometric facial scans, which will be compulsory with ID cards, are to be put on a national database which can then be matched with images from CCTV. The database of faces will enable police and security services to track individuals regardless of whether they have broken the law. CCTV surveillance footage from streets, shops and even shopping centres could be cross-referenced with photographs of every adult in the UK once the ID cards Bill becomes law. Biometric facial scans, iris scans and fingerprints of all adults in the UK will be stored on a national database. Civil liberties groups say the plans are a "dangerous" threat to people's privacy. Mark Oaten, the Liberal Democrat home affairs spokesman, said the plans were being brought in by the Government without informing the public.

For years, the U.S. military has explored a new kind of firepower that is instantaneous, precise and virtually inexhaustible: beams of electromagnetic energy. "Directed-energy" pulses can be throttled up or down depending on the situation, much like the phasers on "Star Trek" could be set to kill or merely stun. Such weapons are now nearing fruition. The hallmark of all directed-energy weapons is that the target -- whether a human or a mechanical object -- has no chance to avoid the shot because it moves at the speed of light. At some frequencies, it can penetrate walls. "When you're dealing with people whose full intent is to die, you can't give people a choice of whether to comply," said George Gibbs, a systems engineer for the Marine Expeditionary Rifle Squad Program who oversees directed-energy projects. "What I'm looking for is a way to shoot everybody, and they're all OK." Among the simplest forms are inexpensive, handheld lasers that fill people's field of vision, inducing a temporary blindness to ensure they stop at a checkpoint, for example. Some of these already are used in Iraq. A separate branch of directed-energy research involves bigger, badder beams: lasers that could obliterate targets tens of miles away from ships or planes. Such a strike would be so surgical that, as some designers put it at a recent conference here, the military could plausibly deny responsibility. The directed-energy component in the project is the Active Denial System, developed by Air Force researchers and built by Raytheon Co. It produces a millimeter-wavelength burst of energy that penetrates 1/64 of an inch into a person's skin, agitating water molecules to produce heat. The sensation is certain to get people to halt whatever they are doing.

Preparing scenarios for action on US soil a shift for Pentagon. The US military has devised its first-ever war plans for guarding against and responding to terrorist attacks in the United States, envisioning 15 potential crisis scenarios and anticipating several simultaneous strikes around the country, according to officers who drafted the plans. The war plans represent a historic shift for the Pentagon, which has been reluctant to become involved in domestic operations and is legally constrained from engaging in law enforcement. Defense officials continue to emphasize that they intend for the troops to play a supporting role in homeland emergencies, bolstering police, firefighters, and other civilian response groups. But the new plans provide for what several senior officers acknowledged is the likelihood that the military will have to take charge in some situations, especially when dealing with mass-casualty attacks that could quickly overwhelm civilian resources.

In the weeks following the atomic attacks on Hiroshima and Nagasaki, U.S. authorities seized and suppressed film shot in the bombed cities by U.S. military crews and Japanese newsreel teams to prevent Americans from seeing the full extent of devastation wrought by the new weapons. It remained hidden until the early 1980s and has never been fully aired. "Although there are clearly huge differences with Iraq, there are also some similarities," said Mitchell, co-author of "Hiroshima in America" and editor of Editor & Publisher. "The chief similarity is that Americans are still being kept at a distance from images of death, whether of their own soldiers or Iraqi civilians." The Los Angeles Times released a survey of six months of media coverage of the Iraq war in six prominent U.S. newspapers and two news magazines -- a period during which 559 coalition forces, the vast majority American, were killed. It found they had run almost no photographs of Americans killed in action. "So much of the media is owned by big corporations and they would much rather focus on making money than setting themselves up for criticism from the White House and Congress," said Ralph Begleiter, a former CNN correspondent. In 1945, U.S. policymakers wanted to be able to continue to develop and test atomic and eventually nuclear weapons without an outcry of public opinion. "They succeeded but the subject is still a raw nerve."

Note: As this highly revealing Reuters article was removed from both the New York Times and the Reuters websites, click here to view it in its entirely on one of the few alternative news websites to report it. And to go much deeper into how the devastating effects of the bomb were covered up by various entities within government, click here.

The underlying issue in the Karl Rove controversy is not a leak, but a war and how America was misled into that war. In 2002 President Bush, having decided to invade Iraq, was casting about for a casus belli. The weapons of mass destruction theme was not yielding very much until a dubious Italian intelligence report ... provided reason to speculate that Iraq might be trying to buy so-called yellowcake uranium from the African country of Niger. the CIA sent Joseph Wilson, an old Africa hand, to Niger to investigate. Mr. Wilson spent eight days talking to everyone in Niger possibly involved and came back to report no sign of an Iraqi bid for uranium. Ignoring Wilson's report, Cheney talked on TV about Iraq's nuclear potential. And the president himself, in his 2003 State of the Union address no less, pronounced: "The British government has learned that Saddam Hussein recently sought significant quantities of uranium from Africa." Wilson directly challenged the administration with a July 6, 2003 New York Times op-ed headlined, "What I didn't find in Africa," and making clear his belief that the president deliberately manipulated intelligence in order to justify an invasion. Three days later, Bob Novak's column appeared giving Wilson's wife's name, Valerie Plame, and the fact she was an undercover CIA officer. Enough is known to surmise that the leaks of Rove, or others deputized by him, amounted to retaliation against someone who had the temerity to challenge the president of the United States. The role of Rove and associates added up to a small incident in a very large scandal - the effort to delude America into thinking it faced a threat dire enough to justify a war.

At half past nine
this morning we were actually running an exercise for a company of over a
thousand people in London based on simultaneous bombs going off precisely
at the railway stations where it happened this morning, so I still have the
hairs on the back of my neck standing up right now. --
Former Scotland Yard Official Peter Power on BBC Radio, 7/7/05 (the day of the bombings)

"The explosives appear to be of military origin, which is very worrying," said Christophe Chaboud, head of the French Anti-Terrorism Coordination Unit and one of five top officials sent by Paris to London immediately after Thursday's attacks. -- Reuters, 7/11/05

A SINGLE bombmaker using high-grade military explosives is believed to be responsible for building the four devices that killed more than 50 people last week. Similar components from the explosive devices have been found at all four murder sites, leading detectives to believe that each of the 10lb rucksack bombs was the work of one man. They also believe that the materials used were not home made but sophisticated military explosives. -- London Times, 7/12/05

Translator Jacob Keryakes, who said that a copy of the message was later posted on a secular Web site, noted that the claim of responsibility contained an error in one of the Quranic verses it cited. That suggests that the claim may be phony. "This is not something al-Qaida would do." he said. - MSNBC News, 7/7/05

John K. Vance [was] a member of the Central Intelligence Agency inspector general's staff in the early 1960s who discovered that the agency was running a research project that included administering LSD and other drugs to unwitting human subjects. Code-named MKULTRA (and pronounced m-k-ultra), the project Mr. Vance uncovered was the brainchild of CIA Director Allen Dulles, who was intrigued by reports of mind-control techniques allegedly conducted by Soviet, Chinese and North Korean agents on U.S. prisoners of war during the Korean War. The CIA wanted to use similar techniques on its own POWs and perhaps use LSD or other mind-bending substances on foreign leaders, including Cuba's Fidel Castro a few years after the project got underway in 1953. Heading MKULTRA was a CIA chemist named Sidney Gottlieb. In congressional testimony, Gottlieb, who died in 1999, acknowledged that the agency had administered LSD to as many as 40 unwitting subjects, including prison inmates and patrons of brothels set up and run by the agency. At least one participant died when he jumped out of a 10th-floor window in a hotel; others claimed to have suffered serious psychological damage. Mr. Vance learned about MKULTRA in the spring of 1963 during a wide-ranging inspector general survey of the agency's technical services division. The inspector general's report said: "The concepts involved in manipulating human behavior are found by many people both within and outside the agency to be distasteful and unethical." MKULTRA came to public light in 1977 as a result of hearings conducted by a Senate committee on intelligence chaired by Sen. Frank Church (D-Idaho).

A panel sponsored by the Council on Foreign Relations wants the United States to focus not on the defense of our own borders, but rather create what effectively would be a common border that includes Mexico and Canada. CHRISTINE ROMANS, CNN CORRESPONDENT: On Capitol Hill, testimony [is] calling for Americans to start thinking like citizens of North America and treat the U.S., Mexico and Canada like one big country. That's the view in a report called "Building a North American Community." It envisions a common border around the U.S., Mexico and Canada in just five years, a border pass for residents of the three countries, and a freer flow of goods and people. [Task force member Robert] PASTOR: What we hope to accomplish by 2010 is a common external tariff which will mean that goods can move easily across the border. We want a common security perimeter around all of North America. ROMANS: Security experts say folding Mexico and Canada into the U.S. is a grave breach of that sovereignty. [The report calls for] temporary migrant worker programs expanded with full mobility of labor between the three countries in the next five years. The idea here is to make North America more like the European Union. [CNN Anchor Lou] DOBBS: Americans must think that our political and academic elites have gone utterly mad at a time when three-and-a-half years, approaching four years after September 11, we still don't have border security. And this group of elites is talking about not defending our borders, finally, but rather creating new ones. It's astonishing.

Note: This agenda is being promoted in key political forums with practically no media reporting. For one of the few media articles reporting on this important topic, click here.

The knees buckle, the brain aches, the stomach turns. And suddenly, nobody feels like protesting anymore. Witnesses describe a minute-long blast of sound emanating from a white Israeli military vehicle. Within seconds, protestors began falling to their knees, unable to maintain their balance. An Israeli military source, speaking on the customary condition of anonymity, confirmed the existence of the Scream. "The intention is to disperse crowds with sound pulses that create nausea and dizziness," the Israel Defence Force spokesperson told the Toronto Star. The IDF is saying little about the science behind the Scream, citing classified information. But the technology is believed to be similar to the LRAD — Long-Range Acoustic Device — used by U.S. forces in Iraq as a means of crowd control. Hillel Pratt, a professor of neurobiology ... likens the effect of such technologies to simulated seasickness. "It doesn't necessarily have to be a loud sound. The combination of low frequencies at high intensities, for example, can create discrepancies in the inputs to the brain," said Pratt. Arik Asherman, a leader of Rabbis For Human Rights, was cautiously optimistic the Scream could make a positive difference. But Asherman said Israeli officials would be wise to use the Scream sparingly. "We need to remind ourselves the problem is not the demonstrations, but what the demonstrations are about," he said. "If this makes it any more difficult for Palestinians to express themselves in a non-violent way, that is problematic. The best way to disperse demonstrations is to deal with the actual issues.

New Jersey is using an anti-terrorism law for the first time to try six animal rights activists charged with harassing and vandalizing a company that made use of animals to test its drugs. Prosecutors say the activists, who will stand trial next week, used threats, intimidation and cyber attacks against employees of Huntingdon Life Sciences, a British company with operations in East Millstone, New Jersey, with the intention of driving it out of business. The six, members of a group called Stop Huntingdon Animal Cruelty (SHAC), are charged under the Animal Enterprise Protection Act, amended in 2002 to include "animal enterprise terrorism," which outlaws disrupting firms like Huntingdon. The list of potential defense witnesses includes actress Kim Basinger, who joined a protest outside a Huntingdon laboratory in Franklin, New Jersey to try to stop such companies using animals to test their pharmaceutical products.

A former FBI official claims he was "Deep Throat," the long-anonymous source who leaked secrets about President Nixon's Watergate coverup to The Washington Post, his family said Tuesday. W. Mark Felt, 91, was second-in-command at the FBI in the early 1970s. His identity was revealed Tuesday by Vanity Fair magazine, and family members said they believe his account is true.

Note: What they failed to investigate is the strong possibility that "Deep Throat" made his revelations on orders from Henry Kissinger. Kissinger (Nixon's Secretary of State) and Nixon are reported to have formed a tenuous alliance to eliminate J. Edgar Hoover, former head of the FBI for almost 50 years. Until his death in May of 1972, Hoover had been arguably the most powerful man in the country for many years. With Hoover out of the way, in June 1972 Kissinger arranged to have Nixon pushed out by setting up the Watergate disclosures through "Deep Throat," according to a well researched book by Leonard Horowitz, Emerging Viruses. Kissinger remains powerful to this day, as evidenced by the personal experience of website founder Fred Burks, who worked as a top US State Department interpreter. See also, excellent article in Slate.

The CIA is conducting a cyber-war game this week geared to simulate a major Internet attack by enemy computer hackers, an intelligence official said Thursday. Dubbed "Silent Horizon," the three-day unclassified exercise is based on a scenario set five years in the future and involves participants from government and the private sector. Online crime has exploded in recent years, a result of organized crime groups based in Eastern Europe. But investigators so far have uncovered few links to Islamic extremists.

Note: Do you think it is the terrorists who want to shut down the Internet, or might there be political elites who don't want their hidden agendas exposed?

There is a
man who fills up his tank once every two months. One tank of gas, literally,
lasts him two months. He is freezing the price of gas by freezing something
else. David Hutchison is a Cryogenics expert. He built this Cryo-Process himself.
A few years ago he began an experiment on his hybrid Honda, freezing the engine
components. The results were a fuel-efficiency dream. A hybrid Honda typically
gets really great gas mileage anyway, around 50 miles to the gallon, but David
Hutchison's cryogenically tempered engine has been known to get close to 120
miles a gallon. Racers have picked up on David's trick of cryogenically
freezing car parts. It is now widely accepted among NASCAR and Indy-car racers.

Note: Why isn't this front-page headlines with rapid development for use by us all?

Oil and gas ensure that the US backs the Uzbek dictator to the hilt. The bodies of hundreds of pro-democracy protesters in Uzbekistan are scarcely cold, and already the White House is looking for ways to dismiss them. The conviction rate in criminal and political trials in Uzbekistan is over 99% - in President Karimov's torture chambers, everyone confesses. Karimov is very much George Bush's man in central Asia. There is not a senior member of the US administration who is not on record saying warm words about Karimov. There is not a single word recorded by any of them calling for free elections in Uzbekistan.

Note: The above article is particularly revealing in that it is written by the UK's former ambassador to Uzbekistan.

ONE of Hitler’s top intelligence officers, who ordered the murders of more than 100 British secret agents in concentration camps, was spared execution as a war criminal and selected to work for MI6. Newly opened papers contain startling evidence that...British Intelligence “turned” Horst Kopkow, faked his death and used him to fight the Cold War. The Atkins documents have been corroborated by newly declassified secret papers in the British and American National Archives. Britain has denied that it engaged in the dark arts used by the Americans, whose employment of Nazis to catch Communists has been well-documented. British intelligence sources pointed out that Kopkow was not in the league of “the butcher of Lyons”, a reference to Klaus Barbie, the most notorious war criminal employed by the Americans. The Kopkow case is uniquely chilling because the MI6 men who spared him were colleagues and “handlers” of his victims. Among those whose torture and death he sanctioned were men and women of the SOE and MI6 agents.

CANNES, France (Reuters) -- A British documentary arguing U.S. neo-conservatives have exaggerated the terror threat is set to rock the Cannes Film Festival on Saturday, the way "Fahrenheit 9/11" stirred emotions here a year ago. At a screening late on Friday ahead of its gala on Saturday, "The Power of Nightmares" by filmmaker and senior BBC producer Adam Curtis kept an audience of journalists and film buyers glued to their seats and taking notes for a full 2-1/2 hours. The film, a non-competition entry, argues that the fear of terrorism has come to pervade politics in the United States and Britain even though much of that angst is based on carefully nurtured illusions.

Growing at a rate of about 900 inmates each week between mid-2003 and mid-2004, the nation’s prisons and jails held 2.1 million people, or one in every 138 U.S. residents, the government reported Sunday. While the crime rate has fallen over the past decade, the number of people in prison and jail is outpacing the number of inmates released. In 2004, one in every 138 U.S. residents was in prison or jail. 61 percent of prison and jail inmates were of racial or ethnic minorities, the government said. An estimated 12.6 percent of all black men in their late 20s were in jails or prisons, as were 3.6 percent of Hispanic men and 1.7 percent of white men in that age group, the report said.

Colin Powell does not need more humiliation. But yesterday a London jury brought down another section of the case he made for war - that Iraq and Osama bin Laden were supporting and directing terrorist poison cells throughout Europe, including a London ricin ring. Yesterday's verdicts on five defendants ... make clear there was no ricin ring. Nor did the "ricin ring" make or have ricin. Not that the government shared that news with us. The public record for the past three fear-inducing years has been that ricin was found in the Wood Green flat occupied by some of yesterday's acquitted defendants. It wasn't. [Found there] were the internal documents of the supposed al-Qaida cell planning the "big one" in Britain. But the recipes were untested and unoriginal, borrowed from US sources. Moreover, ricin is not a weapon of mass destruction. It is a poison which has only ever been used for one-on-one killings. All the information roads led west, not to Kabul but to California and the US midwest. The recipes for ricin now seen on the internet were invented 20 years ago by survivalist Kurt Saxon. The chemical lists found in London were an exact copy of pages on an internet site in Palo Alto, California. But it seems this information was not shared with the then home secretary, David Blunkett, who was still whipping up fear two weeks later. The most ironic twist was an attempt to introduce an "al- Qaida manual" into the case. To show that the Jihad manual was written in the 1980s ... was easy. The ricin recipe it contained was a direct translation from a 1988 US book called the Poisoner's Handbook. We have all been victims of this mass deception.

Note: As the above link no longer functions, click here for the full article. According to a post on Prof. Michel Chossudovsky's excellent Center for Research on Globalization website and other inside sources, the British government ordered the above article removed from the website within a week of its publication. Someone doesn't want us knowing how we are manipulated into fear. For more on this, click here.

This award-winning film provides an inside look at the anatomy of the American war machine. Why We Fight [was originally] the title of a series of propaganda films that Frank Capra began making in 1942, with the aim of encouraging the American war effort against Nazism. Director Eugene Jarecki (The Trials of Henry Kissinger) has used the films as a commentary on the contemporary obsession of the American elite with military power. He also harks back to a speech by President Eisenhower, who, just before he left office, referred to the "military-industrial complex". Eisenhower was worried that too much intelligence, and too much business acumen in America, had become focussed on the production of unnecessary weapons systems. Since Eisenhower's time, everything has become much worse, as Eugene Jarecki describes it. The war in Iraq was made possible by a new range of weapons systems: a bomb called the "bunker buster" was dropped by stealth bombers on the first night of the conflict. Is American foreign policy dominated by the idea of military supremacy? Has the military become too important in American life? Jarecki's shrewd and intelligent polemic would seem to give an affirmative answer to each of these questions.

Note: To watch this great film (which won the Grand Jury Prize at the Sundance Film Festival) free online, click here or here. For powerful information on cover-ups around war, click here.

CMK [Congresswoman Cythia McKinney]: Mr. Secretary, after the last Hearing, I thought that my office was promised a written response to my question regarding the four wargames on September 11th. I have not yet received that response. The question was ... whether or not the activities of the four wargames going on on September 11th actually impaired our ability to respond to the attacks. RM [Top Pentagon Chief, General Richard Myers]: The answer to the question is no, it did not impair our response, in fact General Eberhart who was in the command of the North American Aerospace Defense Command as he testified in front of the 9/11 Commission I believe - I believe he told them that it enhanced our ability to respond, given that NORAD didn't have the overall responsibility for responding to the attacks that day. That was an FAA responsibility. But they were two CPXs; there was one Department of Justice exercise that didn't have anything to do with the other three; and there was an actual operation ongoing because there was some Russian bomber activity up near Alaska. CMK: Who was in charge of managing those wargames? RM: The important thing to realize is that North American Aerospace Defense Command was responsible. These are command post exercises; what that means is that all the battle positions that are normally not filled are indeed filled; so it was an easy transition from an exercise into a real world situation. It actually enhanced the response; otherwise, it would take somewhere between 30 minutes and a couple of hours to fill those positions, those battle stations, with the right staff officers.

Note: For the full transcript of this testimony and more, click here. Why to this day have all media (other than C-SPAN) and the 9/11 Commission Report failed to inform the public that there were four wargames happening at the time of the 9/11 attacks? For possible answers, click here.

Frederick Burks believes in UFOs, communes with dolphins, [and] runs a Web site that promotes conspiracy theories about U.S. complicity in the 9/11 attacks. And, until last October, he had the ear of the world's most powerful man ... George W. Bush. When President Bush traveled to Bali for a meeting with President Megawati in October 2003 ... [Karen] Brooks, then the National Security Council's Indonesia expert, says she personally requested that he get the job because he was so good and "Megawati loved him." Now Mr. Burks has popped up in Jakarta as a star witness for the defense in the terrorism trial of a fundamentalist Islamic cleric. Speaking to the Jakarta court in fluent Indonesian, Mr. Burks described a secret 2002 meeting between a U.S. presidential envoy and Indonesia's then president, Megawati Sukarnoputri. Mr. Burks's testimony, delivered last month in a south Jakarta court, turned the former White House interpreter ... into a national celebrity here in Indonesia. While working as Mr. Bush's Indonesian-language interpreter, Mr. Burks set up several Web sites, including momentoflove.org, weboflove.org and WantToKnow.info. After 9/11, he began collecting and then posting documents he believes show that parts of the U.S. government knew an attack was coming and may even have been complicit in its execution. "I'm sometimes labeled a conspiracy theorist, but I'm not," he says. "I'm someone who can handle dark energy, the really ugly things that are going on behind the scenes, without getting too upset."

Note: This article surprisingly was on the front page of the Wall Street Journal. The above link requires payment to read the full article. To read it free and learn much more, click here.

The only grade school in this rural town is requiring students to wear radio frequency identification badges that can track their every move. Some parents are outraged, fearing it will rob their children of privacy. The badges introduced at Brittan Elementary School on Jan. 18 rely on the same radio frequency and scanner technology that companies use to track livestock and product inventory. The system was imposed, without parental input, by the school as a way to simplify attendance-taking and potentially reduce vandalism and improve student safety. Some parents see a system that can monitor their children's movements on campus as something straight out of Orwell. This latest adaptation of radio frequency ID technology was developed by InCom Corp., a local company co-founded by the parent of a former Brittan student, and some parents are suspicious about the financial relationship between the school and the company. InCom has paid the school several thousand dollars for agreeing to the experiment, and has promised a royalty from each sale if the system takes off, said the company's co-founder, Michael Dobson, who works as a technology specialist in the town's high school.

During the West Coast Power crisis homes went dark and streetlights were out ... causing injuries and accidents. But the danger didn't stop Enron's energy traders from having a good laugh. CBS ... reports on the Enron scheme, as caught on new audio tape. The traders and plant operator laugh and plot in a display that seems to prove the theory that years before the energy crisis, Enron manipulated markets. "They had to do a rolling blackout through the town and there was a red light there he didn't see," one Enron trader says on tape. "That's beautiful," a second voice responds. Enron secretly shut power plants down so they could cause, and then cash in on, the crisis. Enron also pulled power out of states like California, causing emergency conditions to worsen. "Sorry California," an Enron trader says. "I'm bringing all our power out of state today." Plant operators were coached on how to lie to officials. "We want you guys to get a little creative..." one voice says on the tape, "and come up with a reason to go down. Just call 'em, Hey guys…we're coming down." The plant operator replies, "OK, so we're just comin' down for some maintenance?" "Right," the trader says. "And that's cool?" the plant operator asks. "Hopefully," the trader responds, to which the men are heard laughing. Enron also pulled power out of states like California, causing emergency conditions to worsen. The "shut downs" and "pull outs" triggered sky high power prices. "We're just making money hand over fist!" one voice is heard saying on the tape. And when states complained, the guys at Enron seemed to have a response. "Get a f****** clue," one says. "Yeah," another chimes in. "Leave us alone. Let us make a little bit of money."

Note: For an eye-opening two-minute video clip on CBS, watch "Enron Schemers on Tape" at this link. MSNBC also published a revealing article on this. And a New York Times article states "Company officials had long denied that they illegally shut down plants to create artificial shortages. Two months after the recording showed how the Nevada plant was shut down, [Enron CEO Kenneth] Lay called any claims of market manipulation 'conspiracy theories.'" For lots more reliable information on the energy cover-up, click here.

The Central Intelligence Agency is refusing to provide hundreds of thousands of pages of documents sought by a government working group under a 1998 law that requires full disclosure of classified records related to Nazi war criminals. Some made public last year showed a closer relationship between the United States government and Nazi war criminals than had previously been understood, including the C.I.A.'s recruitment of war criminal suspects or Nazi collaborators. For nearly three years, the C.I.A. has interpreted the 1998 law narrowly and rebuffed requests for additional records. The dispute has not previously been made public. The American government worked closely with Nazi war criminals and collaborators, allowing many of them to live in the United States after World War II. Historians who have studied the documents made public so far have said that at least five associates of the Nazi leader Adolf Eichmann, the architect of Hitler's campaign to exterminate Jews, had worked for the CIA. The records also indicate that the CIA tried to recruit two dozen more war criminals or Nazi collaborators. Among former Nazis who were given refuge in the United States was Wernher von Braun, the German scientist who developed the V-2 rocket in World War II for the Nazis and played a major role in the development of the American space program.

Note: Operation Paperclip involved secretly importing hundreds of Nazi scientists into the U.S. and providing them with aliases and influential work in U.S. government and intelligence services. Some of them were known experts in mind control techniques. For more reliable information, click here.

By [Alexander] Shulgin's own count, he has created nearly 200 psychedelic compounds, among them stimulants, depressants, aphrodisiacs, ''empathogens,'' [and] convulsants. And in 1976, Shulgin fished an obscure chemical called MDMA out of the depths of the chemical literature and introduced it to the wider world, where it came to be known as Ecstasy. Most of the scientific community considers Shulgin at best a curiosity and at worst a menace. Now, however, near the end of his career, his faith in the potential of psychedelics has at least a chance at vindication. A little more than a month ago, the [FDA] approved a Harvard Medical School study looking at whether MDMA can alleviate the fear and anxiety of terminal cancer patients. And next month will mark a year since [the start of a] study of Ecstasy-assisted therapy for post-traumatic stress disorder. Shulgin's knack for befriending the right people hasn't hurt. A week after I visited him, he was headed to Sonoma County for the annual ''summer encampment'' of the Bohemian Club, an exclusive, secretive San Francisco-based men's club that has counted every Republican president since Herbert Hoover among its members. For a long time, though, Shulgin's most helpful relationship was with the D.E.A. itself. The head of the D.E.A.'s Western Laboratory, Bob Sager, was one of his closest friends. In his office, Shulgin has several plaques awarded to him by the agency for his service. Shulgin has been credited with jump-starting today's therapeutic research.

Note: The sentence about the Bohemian Club is a very rare revelation in the major media on the influence of this secret society. For lots more reliable, verifiable information on secret societies, click here.

“This is a war against terrorism, and Iraq is just one campaign. The Bush Administration is looking at this as a huge war zone,” the former high-level intelligence official told me. “Next, we’re going to have the Iranian campaign." The President has signed a series of findings and executive orders authorizing secret commando groups and other Special Forces units to conduct covert operations against suspected terrorist targets in as many as ten nations in the Middle East and South Asia. “The Pentagon doesn’t feel obligated to report any of this to Congress,” the former high-level intelligence official said. “They don’t even call it ‘covert ops’ -- it’s too close to the C.I.A. phrase. In their view, it’s ‘black reconnaissance.’ They’re not even going to tell the cincs” -- the regional American military commanders-in-chief.

Mr. Arkin, in the online supplement to his book (codenames.org/documents.html ), says the contingency plan, called JCS Conplan 0300-97, calls for "special-mission units in extra-legal missions to combat terrorism in the United States" based on top-secret orders that are managed by the military's Joint Staff. Mr. Arkin provided The New York Times with briefing slides prepared by the Northern Command, detailing the plan and outlining the military's preparations for the inauguration. Three senior Defense Department and Bush administration officials confirmed the existence of the plan and mission, but disputed Mr. Arkin's characterization of the mission as "extra-legal."

A Scottish nightclub is about to become the first in Britain to offer its customers the chance to have a microchip implanted in their arm to save them carrying cash. The "digital wallet", the size of a grain of rice, guarantees entry to the club and allows customers to buy drinks on account. Brad Stevens, owner of Bar Soba in Glasgow, said his customers had responded enthusiastically to the idea. The VeriChip is inserted by a medical professional and then scanned for its unique ID number as a customer enters the bar. The scheme was criticised by a spokesman for the Scottish Executive, who said the microchip could encourage excessive drinking, and by Notags, a consumer group set up to resist the spread of radio frequency identification devices. A spokesman said: "The chip contains your name and ID number and, as this could be read remotely without your knowledge, that is already too much information."

Note: For summaries of media articles showing an agenda to promote microchip implants in humans, click here. For a well-researched essay by a caring woman whose dog died of cancer likely from a microchip, click here.

Is it conceivable that Al Qaeda, as defined by President Bush as the center of a vast and well-organized international terrorist conspiracy, does not exist? To even raise the question amid all the officially inspired hysteria is heretical. Yet a brilliant new BBC film produced by one of Britain's leading documentary filmmakers systematically challenges this. "The Power of Nightmares: The Rise of the Politics of Fear" ... argues coherently that much of what we have been told about the threat of international terrorism "is a fantasy that has been exaggerated and distorted by politicians. It is a dark illusion that has spread unquestioned ... around the world." Why have we heard so much frightening talk about "dirty bombs" when experts say it is panic rather than radioactivity that would kill people? Why did Defense Secretary Donald Rumsfeld claim on "Meet the Press" in 2001 that Al Qaeda controlled massive high-tech cave complexes in Afghanistan, when British and U.S. military forces later found no such thing? The film ... directly challenges the conventional wisdom by making a powerful case that the Bush administration, led by a tight-knit cabal of Machiavellian neoconservatives, has seized upon the false image of a unified international terrorist threat to replace the expired Soviet empire in order to push a political agenda. "The nightmare vision of a uniquely powerful hidden organization waiting to strike our societies is an illusion. Wherever one looks for this Al Qaeda organization, from the mountains of Afghanistan to the 'sleeper cells' in America, the British and Americans are chasing a phantom enemy."

Note: If above link fails, click here. This highly revealing film by one of Britain's most respected documentary makers is available for free viewing on the Internet. For the link and lots more on this amazingly revealing documentary, click here. For an excellent review of the film in one of the U.K.'s leading newspapers, click here.

Our correspondent discovers a burial site for 10,000 bodies near a Buddhist temple in Thailand. The bodies of british and other Western tourists are being secretly buried in vast mass graves in an open field close to a busy road. Local Red Cross officials told The Times that they were ordered to prepare a site for 10,000 bodies, far more than the Thai Government says were killed by the tsunami, raising doubts that a true count of victims will ever be known.

"With television cameramen hovering, Qualcomm chief executive Irwin Jacobs sat in the front row of coach and made one of the first legal cell phone calls from a commercial jetliner. Jacobs pronounced the [brand new] technology behind the airborne phone call a success, although adding that it will be improved over the next couple years. Connections from the plane were generally good, although some calls were dropped."

Note: To find articles showing multiple cell phone use on Sept. 11, 2001, type "9/11" and "cell phone calls" into your favorite search engine, or click here for a Washington Post report on an alleged 30-minute uninterrupted cell phone call from Flight 93. Click here for a CNN report on another call from that flight. Tests have shown it is not possible to have an extended cell phone conversation above 10,000 feet.

The US passport is about to go electronic, with a tiny microchip embedded in its cover. The chip is the latest outpost in the battle to outwit tamperers. But it's also one that worries privacy advocates. The RFID (radio frequency identification) chip in each passport will contain the same personal data as now appear on the inside pages - name, date of birth, place of birth, issuing office - and a digitized version of the photo. But the 64K chip will be read remotely. And there's the rub. The scenario, privacy advocates say, could be as simple as you standing in line with your passport as someone walks by innocuously carrying a briefcase. Inside that case, a microchip reader could be skimming data from your passport to be used for identity theft. Or maybe authorities or terrorists want to see who's gathered in a crowd and surreptitiously survey your ID and track you. Why not choose a contact chip, where there would be no possibility of skimming, asks Barry Steinhardt, director of the ACLU's Technology and Liberty Project. "There was another way to go, which was to put an electronic strip in the passport that would require contact." The State Department says it's just following international standards set by the International Civil Aviation Organization (ICAO), under the umbrella of the United Nations. The ICAO specified the RFID ... at the behest of the United States. All countries that are part of the US visa-waiver program must use the new passports by Oct. 26, 2005. Mr. Steinhardt ... says the US pushed through the standards against the reservations of the Europeans. "Bush says at the G8 meeting, 'We have to adhere to the global standard,' as though we had nothing to do with it," he says in exasperation.

Hunting for guerillas, handling roadside bombs, crawling across the caves and crumbling towns of Afghanistan and Iraq -- all of that was just a start. Now, the Army is prepping its squad of robotic vehicles for a new set of assignments. And this time, they'll be carrying guns. "Putting something like this into the field, we're about to start something that's never been done before," said Staff Sgt. Santiago Tordillos, waving to the black, 2-foot-six-inch robot rolling around the carpeted floor on twin treads, an M249 machine gun cradled in its mechanical grip. "This opens up great vistas, some quite pleasant, others quite nightmarish. On the one hand, this could make our flesh-and-blood soldiers so hard to get to that traditional war -- a match of relatively evenly matched peers -- could become a thing of the past," he said. "But this might also rob us of our humanity. We could be the ones that wind up looking like Terminators, in the world's eyes."

Peter Hagelstein is trying to revive hope for a future of clean, inexhaustible, inexpensive energy. Fifteen years after the scientific embarrassment of the century ... a panel of scientists gathered. The panel's charge was simple: to determine whether [cold fusion] had even a prayer of a chance at working. The Department of Energy went to great lengths to cloak the meeting from public view. No announcement, no reporters. None of the names of the people attending that day was disclosed. Since 1989, hundreds of scientists working in dozens of labs around the world have claimed ... results. Supporters point to the written literature -- more than 3,000 papers -- as proof of the effect. But the most credible cold fusion advocates concede that the vast majority of those papers are of poor quality. "Brilliant," "genius" and "reclusive" were words used to describe [SRI scientist Peter] Hagelstein 20 years ago, when he rose to prominence as one of the young scientists behind President Ronald Reagan's plans to build a missile shield in outer space. Hagelstein [now] describes the mainstream scientific community as "mafias" that promote and publish their friends' work, unwilling to accept new ideas. As Hagelstein explains it, leading physicists came out swiftly and prematurely against cold fusion. Hagelstein says his acceptance of cold fusion was by no means immediate. It took several years before he was convinced. [Now] Hagelstein says, he has seen enough cold fusion data to convince him that the science is clearly real. The field's acceptance, he maintains, will be simply a matter of the scientific community's looking at the improved experimental results in the future and coming to understand them.

Note: If the above link fails, click here. Why all the secrecy around this important topic? To learn why the power elite don't want cheap energy, click here.

In Minnesota, pigs are being born with human blood in their veins. In Nevada, there are sheep whose livers and hearts are largely human. In California, mice peer from their cages with human brain cells firing inside their skulls. Biologists call these hybrid animals chimeras, after the mythical Greek creature with a lion's head, a goat's body and a serpent's tail. Chimeras are allowing scientists to watch, for the first time, how nascent human cells and organs mature and interact ... inside the bodies of living creatures. But with no federal guidelines in place ... how human must a chimera be before more stringent research rules should kick in? Chimerism becomes a more sensitive topic when it involves growing entire human organs inside animals. And it becomes especially sensitive when it deals in brain cells. Imagine, said Robert Streiffer, a professor of philosophy and bioethics at the University of Wisconsin, a human-chimpanzee chimera endowed with speech ... what some have called a "humanzee." Perhaps the most ambitious efforts to make use of chimeras come from Irving Weissman, director of Stanford University's Institute of Cancer/Stem Cell Biology and Medicine. Weissman helped make the first mouse with a nearly complete human immune system. More recently his team injected human neural stem cells into mouse fetuses, creating mice whose brains are about 1 percent human. Now Weissman says he is thinking about making chimeric mice whose brains are 100 percent human.

I get this a lot: Hey Mark ... why don't you quit toeing the typical blasé journalism line ... and instead write about the real truths? Like for example how both Kerry and Bush are members of mega-yuppie Yale secret society/boys' club Skull & Bones. And why, furthermore, don't you talk about the real truths of 9/11? Haven't you seen that amazing [9/11] video on that Web site? And what about Building 7? Why did that 47-story tower adjacent to the WTC collapse when it had no fire and no plane crash? Why isn't the media reporting any of this? Does this make you laugh? Scoff? It is, after all, incredibly easy to dismiss conspiracy theories. But you know what? It's not that easy. These people ... have a point. They are indeed onto something quite large and ominous and it very much has to do with the media toeing the line of "safe" information. There is indeed ample evidence that the U.S. government, long before 9/11, had already discussed the quite plausible possibilities and strategic benefits of unleashing a "Pearl Harbor"-type event on America. There are plenty of strangely unanswered questions about 9/11, about the stunning inaction of NORAD and Bush's stupefying nonreaction upon hearing of the attack, not to mention his administration's incredible attempts to halt any independent 9/11 investigations. Of course, no one in any major media will touch this stuff. It is professional suicide to dare suggest an alternate truth to the one supplied by the Pentagon and regurgitated by the media. And the truth is, we don't really want such unstable questions answered. We simply cannot tolerate to have our world, our leaders, our foundations so questioned. We prefer stasis to growth, security to true knowledge.

It is shocking: The Bush administration is suppressing a CIA report on 9/11 until after the election, and this one names names. "It is infuriating that a report which shows that high-level people were not doing their jobs in a satisfactory manner before 9/11 is being suppressed," an intelligence official who has read the report told me. [The] release of the report, which represents an exhaustive 17-month investigation by an 11-member team within the agency, has been "stalled." First by acting CIA Director John McLaughlin and now by Porter J. Goss, the former Republican House member (and chairman of the Intelligence Committee) who recently was appointed CIA chief. The official stressed that the report was more blunt and more specific than the earlier bipartisan reports produced by the Bush-appointed Sept. 11 commission and Congress. "The report found very senior-level officials responsible." By law, the only legitimate reason the CIA director has for holding back such a report is national security. None of this should surprise us given the Bush administration's great determination since 9/11 to resist any serious investigation. The president fought against the creation of the Sept. 11 commission, for example, agreeing only after enormous political pressure was applied by a grass-roots movement led by the families of those slain. And then Bush refused to testify to the commission under oath. Instead he deigned only to chat with the commission members, with Vice President Dick Cheney present, in a White House meeting in which commission members were not allowed to take notes.

Note: If the above link fails, click here. For other reliable information on the 9/11 cover-up, click here.

Two strange deaths dramatically changed the balance of power in U.S. government for two recent years. Democratic Senate candidate Mel Carnahan died in a private plane crash on Oct. 16, 2000, just three weeks before the 2000 elections. Mr.
Carnahan went on to win the race as a dead man against his rival
John Ashcroft. Carnahan's wife was appointed to fill his position, but as she was appointed rather than elected, her Senate term was limited to two years rather than the normal six. She lost her 2002 race to her Republican opponent. On Oct. 24, 2002, just two weeks before the 2002 elections, Democratic Senate candidate Paul Wellstone was killed in a plane crash. His wife died with him. Wellstone had been projected to win the election. There are many suspicious circumstances surrounding Wellstone's death. Isn't it quite a coincidence that these two Democratic candidates both died in plane crashes only two years apart, both just weeks before the elections? It's even more of a coincidence that both were very progressive Democrats. Wellstone was often labeled the most progressive member of Senate.

Hundreds of mentally ill patients who were subjected to barbaric CIA-funded brainwashing experiments ... could be entitled to compensation following a landmark court ruling. Doctor Ewan Cameron, who became one of the world’s leading psychiatrists, developed techniques used by Nazi scientists to wipe out the existing personalities of people in his care. Cameron ... was recruited by the CIA during the cold war while working at McGill University in Montreal, Canada. He carried out mind-control experiments using drugs such as LSD on hundreds of patients, but only 77 of them were awarded compensation. Now a landmark ruling by a Federal Court judge in Montreal will allow more than 250 former patients, whose claims were rejected, to seek compensation. Last week, Alan Stein, of Montreal law firm Stein and Stein ... confirmed he was in the process of contacting former clients who could now renew their appeal. “There are about 200 people still due compensation,” he said. Using techniques similar to those portrayed in the celebrated novel the Manchurian Candidate, it was believed that people could be brainwashed and reprogrammed to carry out specific acts. Cameron developed a range of depatterning “treatments”. Patients were woken from drug-induced stupors two or three times a day for multiple electric shocks. In a specially designed “sleep room” made famous by Anne Collins’s book of the same name, Cameron placed a speaker under the patient’s pillow and relayed negative messages for 16 hours a day. Cameron ... rose to become the first president of the World Psychiatric Association.

Note: If the above link does not work, click here. Dr. Cameron was once President of the American and World Psychiatric Associations. For more on the severe abuses of doctors in serving the CIA's mind control programs, click here. This article clearly shows that the Manchurian candidate (programmed assassin) is not just fiction. For a powerful two-page summary of 18,000 pages of declassified CIA documents on this disturbing mind control program, click here. Links to view the original top secret documents are included.

Scientists have discovered a way of manipulating a gene that turns animals into drones that do not become bored with repetitive tasks. The experiments, conducted on monkeys, are the first to demonstrate that animal behaviour can be permanently changed, turning the subjects from aggressive to "compliant" creatures. The genes are identical in humans and although the discovery could help to treat depression and other types of mental illness, it will raise images of the Epsilon caste from Aldous Huxley's futuristic novel Brave New World. The experiments... involved blocking the effect of a gene called D2 in a particular part of the brain. This cut off the link between the rhesus monkeys' motivation and reward. Instead of speeding up with the approach of a deadline or the prospect of a "treat," the monkeys in the experiment could be made to work just as enthusiastically for long periods. The scientists say the identical technique would apply to humans. [They] found that they could make the monkeys work their hardest and fastest all the time, without any complaint or sign of slacking, just by manipulating D2 so that they forgot about the expectation of reward. Methods of manipulating human physical and psychological traits are just around the corner, and the technology will emerge first as a lucrative add-on available from in vitro fertilization clinics. "There's no doubt we will be able to influence behaviour," said Julian Savulescu, a professor of ethics at Oxford University.

Note: For lots more reliable information on how human behavior is already being manipulated, click here.

The FBI has shut down some 20 sites which were part of an alternative media network known as Indymedia. A US court order forced the firm hosting the material to hand over two servers in the UK used by the group. Indymedia says it is a news source for the anti-globalisation movement and other social justice issues. The reasons behind the seizure are unclear but the FBI has reportedly said the action was taken at the request of Italian and Swiss authorities. The servers affected were run by Rackspace, a US web hosting company with offices in London. It said it had received a court order from the US authorities last Thursday to hand over the computer equipment at its UK hosting facility. The reasons behind the action against the Indymedia websites are unclear. The group said the servers affected had hosted the sites of more then 20 local collectives and audio streams for several radio stations, as well as several other projects. The seizure has sparked off protests from journalist groups. "The constitution does not permit the government unilaterally to cut off the speech of an independent media outlet, especially without providing a reason or even allowing Indymedia the information necessary to contest the seizure," said EFF [Electronic Frontier Foundation] Staff Attorney Kurt Opsahl.

Note: This important news was not covered by any major U.S. media. Why? Is it a coincidence that these websites were taken down shortly after they started promoting a video clip showing President Bush may have been using an electronic hearing aid during the presidential election debates with John Kerry? Website founder Fred Burks had personal experience suggesting Bush may have used electronic feeds in high-level meetings while Burks worked as a language interpreter for him. For more, click here.

Darren Williams spent four weeks this summer making a short but startling video that raises novel questions about the 2001 attack. The video, "9/11: Pentagon Strike," suggests that it was not American Airlines Flight 77 that slammed into the Pentagon, but a missile or a small plane. The video offers flashes of photographs taken shortly after impact, interspersed with witness accounts. The pictures seem incompatible with damage caused by a jumbo jet. Firefighters stand outside a perfectly round hole in a Pentagon wall where the Boeing 757 punched through; it is less than 20 feet in diameter. Propelled by word of mouth, Internet search engines and e-mail, the video has been downloaded by millions of people around the world. Williams created a Web site for the video, www.pentagonstrike.co.uk. Then he e-mailed a copy to Laura Knight-Jadczyk [who] posted a link to the video on the group's Web site, www.Cassiopaea.org. Within 36 hours, Williams's site collapsed under the crush of tens of thousands of visitors. But there were others to fill the void. In Texas, a former casino worker who downloaded the video began drawing almost 700,000 visitors a day. In Louisiana, a young Navy specialist put the video on his personal Web page. Suddenly, the site was inundated by more than 20,000 hits. "Pentagon Strike" is just the latest and flashiest example of a growing number of Web sites, books and videos contending that something other than a commercial airliner hit the Pentagon. Knight-Jadczyk said she never imagined anyone outside her group would ever view "Pentagon Strike." "The fact everybody's been sending it to his brother and his cousin ... reflects the fact that there is a deep unease," she said.

Note: This five-minute video is well worth watching, even though it was made a few years ago. To view it free online, click here. For lots more information suggesting a major 9/11 cover-up, click here.

The U.S. Air Force is quietly spending millions of dollars investigating ways to use a radical power source -- antimatter, the eerie "mirror" of ordinary matter -- in future weapons. The most powerful potential energy source presently thought to be available to humanity, antimatter is a term normally heard in science-fiction films. But antimatter itself isn't fiction. During the Cold War, the Air Force funded numerous scientific studies of the basic physics of antimatter. Following an initial inquiry from The Chronicle this summer, the Air Force forbade its employees from publicly discussing the antimatter research program. Still, details on the program appear in numerous Air Force documents distributed over the Internet prior to the ban. It almost defies belief, the amount of explosive force available in a speck of antimatter. One millionth of a gram of positrons contain as much energy as 37.8 kilograms (83 pounds) of TNT. A simple calculation, then, shows that about 50-millionths of a gram could generate a blast equal to the explosion ... in Oklahoma City in 1995. Officials at Eglin Air Force Base initially agreed enthusiastically to try to arrange an interview with ... Kenneth Edwards, director of the "revolutionary munitions" team at the Munitions Directorate at Eglin. "We're all very excited about this technology," spokesman Rex Swenson [said] in late July. But Swenson backed out in August after he was overruled by higher officials in the Air Force and Pentagon. Reached by phone in late September, Edwards repeatedly declined to be interviewed. His superiors gave him "strict instructions not to give any interviews personally. "I'm sorry about that -- this (antimatter) project is sort of my grandchild."

George Bush's grandfather, the late US senator Prescott Bush, was a director and shareholder of companies that profited from their involvement with the financial backers of Nazi Germany. Newly discovered files in the US National Archives [confirm] that a firm of which Prescott Bush was a director was involved with the financial architects of Nazism. His business dealings...continued until his company's assets were seized in 1942 under the Trading with the Enemy Act. There has been a steady internet chatter about the "Bush/Nazi" connection, much of it inaccurate and unfair. But the new documents, many of which were only declassified last year, show that even after America had entered the war...he worked for and profited from companies closely involved with the very German businesses that financed Hitler's rise to power. Remarkably, little of Bush's dealings with Germany has received public scrutiny, partly because of the secret status of the documentation involving him. But now [a] multibillion dollar legal action for damages by two Holocaust survivors against the Bush family, and the imminent publication of three books on the subject are threatening to make Prescott Bush's business history an uncomfortable issue for his grandson. Three sets of archives spell out Prescott Bush's involvement. All three are readily available, thanks to the efficient US archive system. Like his son, George, and grandson, George W, he went to Yale where he was, again like his descendants, a member of the secretive and influential Skull and Bones student society.

Some of electronic voting's loudest defenders have been state and local election officials. Many of those same officials have financial ties to voting machine companies. Former secretaries of state from Florida and Georgia have signed on as lobbyists for Election Systems and Software and Diebold Election Systems. When Bill Jones left office as California's secretary of state in 2003, he quickly became a consultant to Sequoia Voting Systems. His assistant secretary of state took a full-time job there. The list goes on. Even while in office, many election officials are happy to accept voting machine companies' largess. Forty-three percent of the budget of the National Association of Secretaries of State comes from voting machine companies and other vendors. State governments in a growing number of states...have pushed through much-needed laws that require electronic voting machines to produce paper records. But these groups have faced intense opposition from election officials [who] argued that voter-verifiable paper trails...are impractical. While they may sincerely think that electronic voting machines are so trustworthy that there is no need for a paper record of votes, their views have to be regarded with suspicion until their conflicts are addressed.

Marcia Angell [is] a faculty member at the Harvard Medical School [and one of the] former editors of The New England Journal of Medicine. Her new book, "The Truth About the Drug Companies," is a sober, clear-eyed attack on the excesses of drug company power. How does the drug industry deceive us? It plies attending physicians with expense-paid junkets to St. Croix and Key West, Fla., where they are given honoraria and consulting fees to listen to promotional presentations. It promotes new or little-known diseases such as "social anxiety disorder" and "premenstrual dysphoric disorder" as a way of selling the drugs that treat them. It sets up phony front groups disguised as "patient advocacy organizations." It hires ghostwriters to produce misleading scientific articles and then pays academic physicians to sign on as authors. It sends paid lackeys and shills out onto the academic lecture circuit to ''educate" doctors about a drug's unapproved uses. It hires multinational PR firms to trumpet dubious studies as scientific breakthroughs while burying the studies that are likely to harm sales. It buys up the results of publicly funded research. It maintains a political chokehold on the American public by donating more money to political campaigns than any other industry in the country. For many years the drug industry has reaped the highest profit margins of any industry in America. In 2002, the top 10 American drug companies had profit margins of 17 percent; Pfizer, the largest, had profit margins of 26 percent. So staggeringly profitable is the drug industry that in 2002 the combined profits for the top 10 drug companies in the Fortune 500 were greater than those of all the other 490 companies combined.

Note: For an excellent 10-page summary of this revealing book written by the esteemed author, click here. For additional reliable information on the health cover-up, click here.

RNC [Republican National Convention] to Feature Unusual Forms of Sound

Outside the convention hall, New York City police plan to control protesters using a device that directs sound for up to 1,500 feet in a spotlight-like beam. Meanwhile, a display of former Republican presidents inside the hall will feature campaign speeches that are funneled to listeners through highly focused audio beams. Both technologies feature unprecedented manipulation of sound, but for very different purposes. And while both technologies have unique, "gee-whiz" factors, some remain uneasy with the idea of using sound to control crowds. When in weapon mode, LRAD blasts a tightly controlled stream of caustic sound that can be turned up to high enough levels to trigger nausea or possibly fainting. LRAD ... has been used by the U.S. military in Iraq and at sea as a non-lethal force. In these settings, operators can use the device not only to convey orders, but also as a weapon. In tests, police have shown how they can convey orders in a normal voice to someone as far as four blocks away. The sound beam is even equipped with a viewfinder so the operator can precisely target the audio by finding a person in cross hairs. Rather than using pure volume to throw sound far, the LRAD reaches distant ears by focusing the audio beam. Wherever the beam makes contact with air, the air molecules interact in a way that isolates the original audible sound. So if you're standing in front of the ultrasonic sound wave, you can hear the sound. If you're a few inches away, you hear nothing. Already, some Coca-Cola machines in Japan are equipped with the technology so passers-by hear the enticing sound of soda being poured into a glass of ice.

Note: For more reliable information on these "non-lethal weapons," click here.

Atty. Gen. John Ashcroft's announced desire for camps for U.S. citizens he deems to be "enemy combatants" has moved him from merely being a political embarrassment to being a constitutional menace. Ashcroft's plan, disclosed last week but little publicized, would allow him to order the indefinite incarceration of U.S. citizens and summarily strip them of their constitutional rights and access to the courts by declaring them enemy combatants. Ashcroft hopes to use his self-made "enemy combatant" stamp for any citizen whom he deems to be part of a wider terrorist conspiracy. Aides have indicated that a "high-level committee" will recommend which citizens are to be stripped of their constitutional rights and sent to Ashcroft's new camps. Few would have imagined any attorney general seeking to reestablish such camps for citizens. We have learned from painful experience that unchecked authority, once tasted, easily becomes insatiable. We are only now getting a full vision of Ashcroft's America. Ashcroft seems to dream of a country secured from itself, neatly contained and controlled by his judgment of loyalty. For more than 200 years, security and liberty have been viewed as coexistent values. Ashcroft and his aides appear to view this relationship as lineal, where security must precede liberty. Every generation has its test of principle in which people of good faith can no longer remain silent in the face of authoritarian ambition. If we cannot join together to fight the abomination of American camps, we have already lost what we are defending.

Note: If the above link fails, click here. This aritcle was written by Jonathan Turley, a professor of constitutional law at George Washington University. Though Ashcroft resigned, the laws he crafted remain in place.

The American criminal justice system relies too heavily on imprisoning people and needs to consider more effective alternatives, according to a study released Wednesday by the American Bar Assn., the nation's largest lawyers' organization. "For more than 20 years, we've gotten tougher on crime," said Dennis W. Archer, a former Detroit mayor and the group's current president. "We can no longer sit by as more and more people — particularly in minority communities — are sent away for longer and longer periods of time while we make it more and more difficult for them to return to society after they serve their time. The system is broken. We need to fix it." Both the number of incarcerated Americans and the cost of locking them up are massive, the report said, and have been escalating significantly in recent years. Between 1974 and 2002, the number of inmates in federal and state prisons rose six-fold. By 2002, 476 out of every 100,000 Americans were imprisoned. In 1982, the states and federal government spent $9 billion on jails and prisons. By 1999, the figure had risen to $49 billion. Based on trends, a black male born in 2001 has a 1 in 3 chance of being imprisoned during his lifetime, while the chances for a Latino male are 1 in 6, and for a white male, 1 in 17. The report contains numerous reform proposals. Among them: the repeal of mandatory minimum sentencing laws; more funding for substance abuse and mental health programs; assistance for prisoners reentering society; [and] task forces to study racial and ethnic disparities in the criminal justice system.

Note: If above link fails, click here. The prison-industrial complex attracts huge profits and strongly supports laws like "three strikes" where third time offenders are automatically imprisoned for life, even for petty crime.

What [Israeli historian Gad] Kroizer had discovered and later footnoted in an academic paper ... was the location of an ultrasecret jail where Israel has held Arabs in total seclusion for years, barred visits by the Red Cross and allegedly tortured inmates. Known as 1391, the facility is used as an interrogation center by a storied unit of Israel's military intelligence, whose members-all Arabic speakers-are trained to wring confessions from the toughest militants. Some of the methods are reminiscent of Abu Ghraib: nudity as a humiliation tactic, compromising photographs, sleep deprivation. In a few cases, at least, interrogators at 1391 appear to have gone beyond Israel's own hair-splitting distinction between torture and what a state commission referred to in 1987 as "moderate physical pressure." But the nightmare for those in 1391 is the isolation and the fear that no one knows where you are. The location of the compound is so hush-hush that a court this year banned a visit by an Israeli legislator. Prisoners describe being hooded everywhere at the facility except in their cells. Hassan Rawajbeh ... a member of the nearly disbanded Palestinian Preventive Security force ... was picked up by soldiers in Nablus 18 months ago. He was hooded, handcuffed and thrown on the floor of a van. When the hood was removed, he was in a tiny, windowless cell. The chamber contained no toilet, only a bucket in the corner, which ... his jailers would empty once every few weeks. A low buzzing droned constantly. For nearly four months, Rawajbeh saw no one but his interrogators, who kept him naked for days at a time and prevented him from going to the bathroom.

As opposite as George Bush and John Kerry may seem to be, they do share a common secret - one they've shared for decades. The secret: details of their membership in Skull and Bones, the elite Yale University society whose members include some of the most powerful men of the 20th century. Bonesmen, as they're called, are forbidden to reveal what goes on in their inner sanctum. Bones has included presidents, cabinet officers, spies, Supreme Court justices, [and] captains of industry. They'd responded to questions with utter silence until an enterprising Yale graduate, Alexandra Robbins, managed to penetrate the wall of silence in her book, Secrets of the Tomb. "I spoke with about 100 members of Skull and Bones. They were members who were tired of the secrecy,” says Robbins. “But probably twice that number hung up on me, harassed me, or threatened me.” Skull and Bones, with all its ritual and macabre relics, was founded in 1832. Since then, it has chosen or "tapped" only 15 senior students a year who become ... lifetime members of the ultimate old boys' club. A lot of Bonesmen have gone on to positions of great power. President Bush ... tapped five fellow Bonesmen to join his administration. Bonesmen have [included] William Howard Taft, the 27th President; Henry Luce, the founder of Time Magazine; and W. Averell Harriman, the diplomat and confidant of U.S. presidents. Mr. Bush, like his father and grandfather before him, has refused to talk openly about Skull and Bones. But as a Bonesman, he was required to reveal his innermost secrets to his fellow Bones initiates. They're supposed to recount their entire sexual histories in ... a dimly-lit cozy room.

Note: For a highly revealing, four-minute CNN News clip on Skull and Bones, click here. For other major media news clips reporting on this powerful secret society, click here. And for lots more reliable information from major media sources on powerful, secret groups like this, click here.

Queuing to get into one nightclub in Spain could soon be a thing of the past for regular customers thanks to a tiny computer chip implanted under their skin. The technology, known as a VeriChip, also means nightclubbers can leave their cash and cards at home and buy drinks using a scanner. The bill can then be paid later. Clubbers who want to join the scheme at Baja Beach Club in Barcelona pay 125 euros (about US $150) for the VeriChip -- about the size of a grain of rice -- to be implanted in their body. Then when they pass through a scanner the chip is activated and it emits a signal containing the individual's number, which is then transmitted to a secure data storage site. The club's director, Conrad Chase, said he began using the VeriChip, made by Applied Digital Solutions, in March 2004 because he needed something similar to a VIP card and wanted to provide his customers with better service. He said 10 of the club's regular customers, including himself, have been implanted with the chip, and predicted more would follow. "I know many people who want to be implanted," said Chase. "Almost everybody now has a piercing, tattoos or silicone. Why not get the chip and be original?" Chase said VeriChip could also boost security by speeding up checks at airports, for example. He denied the scheme had any drawbacks. The VeriChip is an in-house debit card and contains no personal information.

Note: Why is the media so upbeat about this? The article raises very few questions, yet seems to promote microchip implants in humans as the wave of the future for commerce.

Iraq in flames, Washington an object of disgust. What to do? At this pivotal moment, CNN and Fox News are tipped off to a clip of an American citizen being beheaded. The victim is ... Nick Berg.The vile deed is deemed the work of al-Qaeda. The timing of the video was brilliant for the West. Media pundits judged the crime a deeper evil than the systemic torture of innocent Iraqis. But some people sensed a rat. But if it was not al-Qaeda, who? While this video shows a human body having its head chopped off, it does not necessarily portray an act of murder. A month before the discovery of [his] corpse, Berg had been released from custody. But whose custody? Brigadier General Mark Kimmitt ... claimed he was in the custody of Iraqi police. However, the Iraqi police chief [stated] "the Iraqi police never arrested the slain American". Berg's family are certain his jailers were the US military. His father, Michael, had been told so by the FBI. He has produced an email from a US consular official ... confirming that his son was in the hands of the US. In his final moments on screen Berg is wearing an orange jumpsuit of the kind familiar from Guantanamo Bay. His white chair is identical to those in the photographs of the Abu Ghraib prison tortures. During the decapitation, starting at the front of the throat, there is little sign of blood. The scream is wildly out of sync, sounds female, and is obviously dubbed. Dr John Simpson, executive director for surgical affairs at the Royal Australasian College of Surgeons ... agrees with other experts who find it highly probable that Berg had died before his decapitation. There's something fishy about this video. In the end, the question is: who killed Nick Berg, and why?

Note: If the above link fails, click here. For a CNN article raising other serious questions on Berg, click here. For more reliable information on how government can control and manipulate public perception, click here.

A San Jose man who claimed the CIA secretly had given him LSD in 1957 as part of a mind-control experiment -- causing him to try to hold up a San Francisco bar ... offered enough evidence of possible drugging to go to trial on his $12 million damages suit. The decision by Chief U.S. District Judge Marilyn Hall Patel cited what appeared to be an admission by a former operative in the CIA program ... that he had slipped LSD into one of Wayne Ritchie's drinks. "I drugged guys involved in about 10, 12 (instances)," former federal narcotics agent Ira Feldman, who worked for the CIA's Project MKULTRA, told Ritchie's lawyer. The [MKULTRA] program ... was an attempt to find chemicals or techniques that could control human consciousness. The CIA and federal narcotics agents started giving mind-altering drugs to unsuspecting government employees, private citizens and prison volunteers in the early 1950s. Ritchie believes he was drugged during an office Christmas party. He ... was overcome with depression and a feeling that everyone had turned against him. He ... drove to a Fillmore District bar, demanded money ... and was hit over the head and knocked unconscious. He pleaded guilty to attempted robbery. Ritchie quit his job in disgrace, found work as a housepainter and spent years fighting off suicidal urges. Then in 1999, he read the obituary of MKULTRA's director, Sidney Gottlieb, and began to believe he had been one of the program's guinea pigs -- especially after the diary of a now-deceased MKULTRA agent showed he might have attended the same Christmas party.

Note: Though Ritchie lost the first round in court, he plans to appeal. For an abundance of reliable, verifiable information on secret government mind control programs, click here.

Skull and Bones is a shadowy, elite secret society that selects 15 new members each year from the senior class at Yale. It is known both for its celebrity membership - past "taps'' include William F. Buckley Jr., President William Howard Taft, and Henry Luce, the founder of Time magazine - and for its bizarre rituals. The rites - said to include a "blood''-drinking initiation and oodles of frank sex talk by the once all-male undergrads (Bones started admitting women in 1992) - are much discussed but little known. This is, after all, a secret society. In her 2002 book, "Secrets of the Tomb,'' Alexandra Robbins speculated that the 2004 presidential election might pit Bonesman George W. Bush (Yale, 1968) against Bonesman John F. Kerry (Yale, 1966.) Good call! This organization [was] once deemed to be so secretive that members had to leave the room if the society's name was ever mentioned in public. Both Bush's father and his grandfather, Senator Prescott Bush, were Bonesmen. [Bonesman John Kerry's] second wife's first husband, the late senator John Heinz, was Bones, as was his father. GWB: "My senior year I joined Skull and Bones, a secret society, so secret I can't say anything more" (from his 1999 campaign biography). JFK [John Kerry]: "There's not much I can say, Tim, because it's a secret" (to Tim Russert on "Meet the Press").

Note: If secret societies produce this many influential leaders, shouldn't the public have a right to know more about them? For lots more, click here.

LEHMAN. Were you told that there were numerous young Arab males in flight training? RICE. I was not. LEHMAN. Were you told that the red team in F.A.A. for 10 years had reported ... that the U.S. airport security system never got higher than 20 percent effective. RICE. To the best of my recollection I was not told that. LEHMAN. Were you aware that I.N.S. had quietly internally halved its internal security enforcement budget? RICE. I was not made aware of that. LEHMAN. Were you aware that it was the U.S. government established policy not to question or oppose the sanctuary policies [which] prohibited the local police from cooperating at all with federal immigration authorities? RICE. I do not believe I was aware of that. LEHMAN. Were you aware of a program that was well established that allowed Saudi citizens to get visas without interviews? RICE. I learned of that after 9/11. LEHMAN. Were you aware of the extensive activities [of] the Saudi government in supporting over 300 radical teaching schools and mosques around the country, including right here in the United States? Were you aware at the time of the fact that Saudi Arabia ... had in their custody the C.F.O. [Chief Financial Officer] and the closest confidante of Al Qaeda, of Osama bin Laden, and that they refused direct access to the United States? RICE. I don't remember anything of that kind. LEHMAN. Were you aware that they would not cooperate and give us access to the perpetrators of the Cobar Towers attack? RICE. I was very involved in issues concerning Cobar Towers. LEHMAN. Were you aware that it was the policy of the Justice Department ... to fine airlines if they have more than two young Arab males in secondary questioning? RICE. No.

Note: Don't miss the full revealing transcript at the link above. Most of the quotes above are towards the bottom of the webpage. Why didn't we hear lots more about these astounding facts put forward by one of the 9/11 commissioners, yet hardly mentioned in the final report? For lots more, click here.

Pres. Bush and John Kerry were both members of the secret organization. ‘Skull and Bones’ dates to 1832. It was in fact a reaction to a secret society, the Masons. Founder William Huntington Russell thought of his little enclave as sort of anti-Masons and as a home for the wealthy and the powerful ... who would do anything for another Bonesman. Each year, 15 young undergraduate seniors are tapped for membership. Members of ‘Skull and Bones’ gather on High Street in the Yale campus at the tomb. New members, the neophytes, are expected to do things like lie in coffins, wrestle in mud, kiss a skull, and confess their sexual histories in front of the group to bond themselves together. Once you‘re in, you‘re in: ‘Skull and Bones’ is for life. There are a lot of [famous] Bonesmen ... Henry Luce, who created “TIME” magazine; Harold Stanley, founder of Morgan Stanley; William F. Buckley; Averell Harriman, long-time governor of New York. And then there are the presidents: William Howard Taft, whose father, Alphonso, had helped found the group; George Herbert Walker Bush, whose father, Prescott, was a Bonesman and a senator; the current President Bush. [And there's] John Kerry, Bonesman class of ‘66. His wife Teresa Kerry‘s first husband, John Heinz ... was ‘Skull and Bones.’ Both Bush and Kerry refused to answer ‘Meet the Press’ host Tim Russert when asked about the organization. Alexandra Robbins, author of “Secrets of the Tombs" [said] "The sole purpose of Skull and Bones is to get members into positions of power and then to have those members hire other members to prominent positions, which is something that President Bush has done."

Note: For a highly revealing, four-minute CNN News clip on Skull and Bones, click here. For other major media video clips reporting on this powerful secret society, click here. Many have claimed that secret societies have not had much influence on world politics. This article and videos raises many serious questions about this. For those interested in exploring reliable information covering the big picture of how and why these secret societies are using government-sponsored mind control programs to achieve their agenda, click here. And for other revealing media news articles on powerful secret societies, click here.

At least once a year during the 1980s Dick Cheney and Donald Rumsfeld vanished. Cheney was ... a [Republican] congressman. Rumsfeld [was] the head of G. D. Searle & Co.. Yet for periods of three or four days at a time no one in Congress knew where Cheney was, nor could anyone at Searle locate Rumsfeld. Rumsfeld and Cheney were principal actors in one of the most highly classified programs of the Reagan Administration. [It] called for setting aside the legal rules for presidential succession ... in favor of a secret procedure for putting in place a new "President" and his staff. The program is of particular interest today because it helps to explain the thinking and behavior of the second Bush Administration [since] September 11, 2001. The idea was to concentrate on speed, to preserve "continuity of government," and to avoid cumbersome procedures; the speaker of the House, the president pro tempore of the Senate, and the rest of Congress would play a greatly diminished role. "One of the awkward questions we faced ... was whether to reconstitute Congress after a nuclear attack. It was decided that no, it would be easier to operate without them." [Cheney's and Rumsfeld's] participation in the extra-constitutional continuity-of-government exercises ... also demonstrates a broad, underlying truth about these two men. For three decades ... even when they were out of the executive branch of government, they were never far away. They stayed in touch with defense, military, and intelligence officials, who regularly called upon them. They were ... a part of the permanent hidden national-security apparatus of the United States.

Note: If above link fails, click here. The author, James Mann, is a former Washington correspondent for the Los Angeles Times, and senior writer-in-residence at the Center for Strategic and International Studies, in Washington, D.C. Apparently, Cheney and Rumsfeld don't find Congress to be very important.

The FBI used murderers as informants in Boston for three decades, even allowing innocent men to be sentenced to death to protect the secret operation, a government report has found. The FBI's policy "must be considered one of the greatest failures in the history of federal law enforcement" and had "disastrous consequences", the report by the House Committee on Government Reform said. More than 20 people were murdered by FBI informants in Boston from 1965, often with the help of FBI agents, it said. But no FBI agent or official has ever been disciplined. The FBI's policy of using murderers grew out of a belated effort by a former director, J. Edgar Hoover, to go after the Mafia, which Hoover had earlier denied even existed. In the early 1960s, the bureau began recruiting underworld informers in its new campaign. The report focuses heavily on one episode, the 1965 murder of Edward Deegan, a small-time hoodlum who was killed by Jimmy Flemmi and Joseph Barboza, who had just been recruited by an FBI agent in Boston. The FBI knew the two men were the killers because it had been using an unauthorised wire tap and had heard Flemmi ask the Mafia boss, Raymond Patriarca, for permission to kill Deegan. A few days later, Deegan was shot dead. Four men who had nothing to do with the killing were tried and convicted, with two sentenced to death and two to life in prison. Two of the men died in prison and two had their sentences commuted and were freed after serving 30 years behind bars. Hoover was kept fully informed about this murder and the wrongful convictions, the report said.

Hitler and his henchmen victimized an entire continent and exterminated millions in his quest for a so-called Master Race. But the concept of a white, blond-haired, blue-eyed master Nordic race didn't originate with Hitler. The idea was created in the United States, and cultivated in California, decades before Hitler came to power. Eugenics would have been so much bizarre parlor talk had it not been for extensive financing by corporate philanthropies, specifically the Carnegie Institution, the Rockefeller Foundation and the Harriman railroad fortune. They were all in league with some of America's most respected scientists from such prestigious universities as Stanford, Yale, Harvard and Princeton. These academicians espoused race theory and race science, and then faked and twisted data to serve eugenics' racist aims. Stanford President David Starr Jordan originated the notion of "race and blood" in his 1902 racial epistle "Blood of a Nation," in which the university scholar declared that human qualities and conditions such as talent and poverty were passed through the blood. The Rockefeller Foundation helped found the German eugenics program and even funded the program that Josef Mengele worked in before he went to Auschwitz.

Note: Josef Mengele's US-funded eugenics research laid the foundation for his experimentation on human subjects before and during World War II. He went on to participate in CIA-funded mind-control experimentation after that war. For more on Mengele, click here.

A former Navy attorney who helped lead the military investigation of the 1967 Israeli attack on the USS Liberty that killed 34 American servicemen says former President Lyndon Johnson and his defense secretary, Robert McNamara, ordered that the inquiry conclude the incident was an accident. Retired Capt. Ward Boston said Johnson and McNamara told those heading the Navy's inquiry to "conclude that the attack was a case of 'mistaken identity' despite overwhelming evidence to the contrary." Boston was senior legal counsel to the Navy's original 1967 review of the attack. He said in the sworn statement that he stayed silent for years because ... "when orders come ... I follow them." The USS Liberty was an electronic intelligence-gathering ship that was cruising international waters off the Egyptian coast on June 8, 1967. Israeli planes and torpedo boats opened fire on the Liberty. It was "one of the classic all-American cover-ups," said Ret. Adm. Thomas Moorer, a former Joint Chiefs of Staff chairman who spent a year investigating the attack as part of an independent panel he formed with other former military officials. The panel also included a former U.S. ambassador to Saudi Arabia, James Akins. David Lewis of Lemington, Vt., was on the Liberty when it was attacked. In an interview, he said Israel had to know it was targeting an American ship. He said a U.S. flag was flying that day and Israel shot it full of holes. The sailors on the ship, he said, quickly hoisted another American flag, a much bigger one, to show Israel it was a U.S. vessel.

Note: For lots more on this major cover-up by a U.S. president and top military officers, click here. ABC producer James Bamford, who exposed the Operation Northwoods cover-up, also has an excellent chapter on this event in his highly revealing book, Body of Secrets, about the National Security Agency.

At least 11 countries provided advance warning to the US of the 9/11 attacks. Two senior Mossad experts were sent to Washington in August 2001 to alert the CIA and FBI to a cell of 200 terrorists said to be preparing a big operation. The list they provided included the names of four of the 9/11 hijackers, none of whom was arrested. In November 2001 the US airforce complained it had had al-Qaida and Taliban leaders in its sights as many as 10 times over the previous six weeks, but had been unable to attack because they did not receive permission quickly enough. The BBC reported [that] a former Pakistan foreign secretary was told by senior American officials at a meeting in Berlin in mid-July 2001 that "military action against Afghanistan would go ahead by the middle of October". Zacarias Moussaoui ... was arrested in August 2001. One agent wrote, a month before 9/11, that Moussaoui might be planning to crash into the Twin Towers. US agents ... sought a warrant to search his computer. They were turned down by the FBI. [A] PNAC blueprint supports an earlier document ... which said the US must "discourage advanced industrial nations from challenging our leadership". The document also calls for the creation of "US space forces" to dominate space, and the total control of cyberspace to prevent "enemies" using the internet. It also hints that the US may consider developing biological weapons "that can target specific genotypes [and] may transform biological warfare from the realm of terror to a politically useful tool". The conclusion of all this analysis must surely be that the "global war on terrorism" has the hallmarks of a political myth propagated to pave the way for a wholly different agenda - the US goal of world hegemony, built around securing by force command over the oil supplies required to drive the whole project.

Note:This is one of the very few articles recommended as a must read. Michael Meacher was the U.K. Minister of Environment from May 1997 to June 2003. Mr. Meacher lays out a wealth of highly revealing information backed by reliable sources. To confirm most of his statements on our 9/11 timeline, click here. Mr. Meacher's cliams were reported on BBC News, as well, though the BBC mentioned amazingly little on his claims of U.S. involvement in 9/11. To see the BBC article click here.

A U.S. company launched Thursday in Mexico the sale of microchips that can be implanted under a person's skin and used to confirm everything from health history to identity. The microchips ... went on sale last year in the United States. The microchip, the size of a grain of rice, is implanted in the arm or hip and can contain information on everything from a person's blood type to their name. In a two-hour presentation, Palm Beach, Florida-based Applied Digital Solutions Inc. introduced reporters to the VeriChip and used a syringe-like device and local anesthetic to implant a sample in the right arm of employee Carlos Altamirano. “It doesn't hurt at all,” he said. “The whole process is just painless.” Antonio Aceves, the director of the Mexican company charged with distributing the chip here, said that in the first year of sales, the company hoped to implant chips in 10,000 people and ensure that at least 70 percent of all hospitals had the technology to read the devices. One chip costs $150 and has a $50 annual fee. Users can update and manage their chips' information by calling a 24-hour customer service line. The VeriChip can track subjects who are within 5 miles, but officials want to develop a new chip that can use satellite technology to track people who are farther away and may have been kidnapped. While the idea of using the chip to track people has raised privacy concerns in the United States, the idea has been popular with Mexicans. The company hopes to have the new anti-kidnapping chip developed by 2003.

Coming to you soon from the Pentagon: the diary to end all diaries — a multimedia, digital record of everywhere you go and everything you see, hear, read, say and touch. Known as LifeLog, the project has been put out for contractor bids by the Defense Advanced Research Projects Agency, or DARPA, the agency that helped build the Internet and that is now developing the next generation of [surveillance] tools. The agency ... [considers] LifeLog ... a tool to capture "one person's experience in and interactions with the world" through a camera, microphone and sensors worn by the user. Everything from heartbeats to travel to Internet chatting would be recorded.
The goal is to create breakthrough software that helps analyze behavior, habits and routines, according to Pentagon documents reviewed by The Associated Press. The products of the unclassified project would be available to both the private sector and other government agencies — a concern to privacy advocates. John Pike of Global Security.org, a defense analysis group, is dubious the project has military application. "I have a much easier time understanding how Big Brother would want this than how (Defense Secretary Donald) Rumsfeld would use it," Pike said. "They have not identified a military application."

The Department of Defense, already infamous for spending $640 for a toilet seat...couldn't account for more than a trillion dollars in financial transactions, not to mention dozens of tanks, missiles and planes. The nonpartisan General Accounting Office has raised the volume of its perennial complaints about the financial woes at Defense, which recently failed its seventh audit in as many years. "Overhauling DOD's financial management operations represent a challenge that goes far beyond financial accounting," GAO chief David Walker told lawmakers. Recent government reports suggest the Pentagon's money management woes have reached astronomical proportions. A GAO report found Defense inventory systems so lax that the U.S. Army lost track of 56 airplanes, 32 tanks, and 36 Javelin missile command launch-units. When military leaders were scrambling to find enough chemical and biological warfare suits to protect U.S. troops, the department was caught selling these suits as surplus on the Internet "for pennies on the dollar," a GAO official said. "We are overhauling our financial management system," said Dov Zakheim, the Pentagon's chief financial officer. "The Pentagon has failed to address financial problems that dwarf those of Enron," said Rep. Henry Waxman, D-Los Angeles. Gregory Kutz, director of GAO's financial management division [said] "I've been to Wal-Mart. They were able to tell me how many tubes of toothpaste were in Fairfax, Va. And DOD can't find its chem-bio suits." Opposition to defense spending is portrayed as unpatriotic. Legislators are often more concerned about winning Pentagon pork than controlling defense waste.

Note: You can read the GAO Report (Page 17 on missing planes). Page two states, "To date, no major part of DOD has yet been able to pass the test of an independent audit." For an intriguing Online Journal article exposing the deep role of the Pentagon's former CFO (Chief Financial Officer) Zakheim in this corruption, click here. Why wasn't and isn't this front page headlines? Why are newspaper editors keeping this most vital information from the public?